LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 04-21-2008, 05:51 PM   #1
shafey
Member
 
Registered: Aug 2005
Posts: 47

Rep: Reputation: 15
apache under attack


Dear guys

My server was unstable at this month
sometimes fork 700 process and apache 80 access per second
and that's made server very slow . very bad browsing

when i checked log files /var/log/messages found that errors

Apr 20 04:06:28 suhosin[798]: ALERT - configured request variable value length limit exceeded - dropped variable 'message' (attacker '212.107.116.238', file '/usr/local/cpanel/cgi-sys/php4')
Apr 22 00:27:05 suhosin[15442]: ALERT - configured request variable name length limit exceeded - dropped variable 'amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;a mp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp ;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;a mp;amp;amp;amp;amp;amp;goto' (attacker '87.117.227.208', file '/usr/local/cpanel/cgi-sys/php4')
Apr 22 00:27:06 suhosin[15445]: ALERT - configured request variable name length limit exceeded - dropped variable 'amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;a mp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp ;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;a mp;amp;amp;amp;amp;amp;goto' (attacker '87.117.227.208', file '/usr/local/cpanel/cgi-sys/php4'

How could i stop that attack by mod_security

Thanks
 
Old 04-21-2008, 06:55 PM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
The Suhosin alerts already tell you it dropped the request, so that's good. I'd use something like the iptables recent, tarpit, hash or equivalent module instead to keep connection limits or drop offenders, then Snort to catch any exploiting and then mod_security to deny everything else bad that passes up the stack. There's more but it's a start.
 
Old 04-21-2008, 06:55 PM   #3
nathacof
Member
 
Registered: Aug 2004
Location: Bear, DE, USA
Distribution: Slackware 11, CentOS 5.2, Ubuntu
Posts: 124

Rep: Reputation: 17
An introduction to mod_security can be found here, http://www.onlamp.com/pub/a/apache/2..._security.html.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
CentOS Apache Server - identifying (virtual host) target of spam attack Lord Matt Linux - Server 3 04-07-2008 02:17 AM
Please do not attack me anasmich General 1 08-28-2007 11:48 AM
apache log attack rino.caldelli Linux - Security 3 03-05-2006 05:49 PM
What attack could this be??? darrel Linux - Security 10 02-26-2005 10:10 PM
What to do during an attack? revenant Linux - Security 9 04-02-2004 12:18 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 04:12 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration