I just did a quick review of the logs, and found that there were only a
couple of blatent attacks.  The rest of the hits seem to be looking for URLs
pertaining to my old server (well, that's what most of the 404's are), these
will go away over time.  It looks like these are mostly valid requests,
though I don't know why or how they are hitting the root folder, without
also requesting the image or css files.  But, at this time I'm satisfied
that I'm not really under attack.

Thanks for the support.

Shawn

-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
Behalf Of Niels Voll
Sent: Monday, March 22, 2004 4:04 PM
To: CLUG General
Subject: Re: [clug-talk] Am I being attacked?


I usually just peruse Apache's access.log file with a regular text
editor or "tail" command. If you are ambitious, you can probably import
it into a spreadsheet program, since it is a columnar file with
double-quotes surrounding the text fields.

A typical log entry looks like this (disregard any line-breaking, which
may be an artifact of emailing this - there is one line for each hit to
your server):

198.161.94.245 - - [22/Mar/2004:10:13:10 -0700] "GET
/nvcm/en/index.php?id=29 HTTP/1.1" 200 3039
"http://clug.ca/nuke/modules.php?name=Web_Links&l_op=viewlink&cid=6";
"Mozilla/5.0 Galeon/1.2.7 (X11; Linux i686; U;) Gecko/20030131"

The fields are

* IP addreess of the request
* Date/Time stamp (your server time)
* the HTTP command, received by your server - typically a GET or PUT,
and the URL requested
* HTTP response code (200=OK)
* I believe, the next one is the size of the retrieved file
* the refering page - if someone requested this page because of a link
from another web page, you would see that here - some attacks may try to
use this field for buffer overflows or SQL injection  trickery; on the
other hand, if your hits are increasing, because a popular page linked
to you, you can find out from this field.
* the requesting browser or robot - attackers often play games with this
field similar to the refering page field, and some entires are caused by
search engine robots. Search engines will find your site, as long as it
has a DNS entry, some may even find it without one.

If you are comfortable with, and wish to do so it, send me your Apache
access.log-file off-list, and I'll have a quick peek at it, to see, if
there is an easy explanation for the increase in traffic.Don't worry, if
it's large, my mail server takes rather large attachments without
complaints.

Kind regards,

...Niels








Shawn Grover wrote:

>Thanks Niels.
>
>Any suggestion on how I could find the particular lines in the log file?  I
imagine a grep command might be useful, or maybe there's another tool for
analysing the logs?
>
>Shawn
>
>(btw - I'll make note to change my default email account later tonight - My
messages shouldn't be going out from the "spam" account)
>
>-----Original Message-----
>From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
>Behalf Of Niels Voll
>Sent: Monday, March 22, 2004 12:38 PM
>To: CLUG General
>Subject: Re: [clug-talk] Am I being attacked?
>
>
>Hi Shawn,
>
>I'd be curious to see the actual detailed Apache log entries. For
>example, what's exactly in the user agent fields, and what's in the
>referer fields (if anything). Is there a large commonality? Anything odd
>about those?
>
>In the past, I've seen attacks on my server most often one of 2 major
>varieties:
>
>* very long URL's trying to go after old MS IIS vulnerabilities
>* SQL injection attacks through the referer or user agent fields
>
>
>...Niels
>
>
>
>
>
>
>
>
>
>spam wrote:
>
>
>
>>Hi all.
>>
>>In the past week, I reset my Apache logs and got Analog setup to run every
>>hour.  I'm noticing a very large number of page requests from Taiwan and
>>Japan (well, maybe not VERY large, but definetly much more than I would
>>expect).  Analog also indicates that in the past week I've had 500+ unique
>>visitors.  Before I took the site down for a server rebuild, I was
hovering
>>around 700 unique visitors over a 6 month period - 500 in less than a week
>>seems too high.
>>
>>You can see the logs at http://logs.open2space.com/open2space/index.html.
>>
>>Now, seeing as the www.open2space.com website was effectively down for the
>>past couple of months, I was very surprised to see 200+ page requests from
>>external sources within the first couple of hours of the site being back
up.
>>The site has never received too many hits.  I have not announced publicly
>>that the site was up and running again yet either - though a few coworkers
>>are aware it is.
>>
>>It seems the requests are primarily for the root web page. Now, to add to
>>the plot, I changed the root directory for open2space.com via a virtual
host
>>setting.  Prior to this I happened to find a "B2" folder under the web
root
>>that was empty.  I don't remember creating this folder, but might have.
>>Regardless, it's been deleted.  I've also run chkrootkit on the box with
>>nothing suspicious found.
>>
>>So, I'm curious to know if the traffic is legitimate, or if maybe I need
to
>>tighten down my server a little more - I'm reasonably confident it's
fairly
>>secure as is.  Anyone have any thoughts? Or are there any command line
tools
>>I could use to glean more info from my logs?
>>
>>Thanks muchly for any feedback.
>>
>>Shawn
>>
>>
>>
>>
>>_______________________________________________
>>clug-talk mailing list
>>[EMAIL PROTECTED]
>>http://clug.ca/mailman/listinfo/clug-talk_clug.ca
>>
>>
>>
>>
>>
>
>_______________________________________________
>clug-talk mailing list
>[EMAIL PROTECTED]
>http://clug.ca/mailman/listinfo/clug-talk_clug.ca
>
>_______________________________________________
>clug-talk mailing list
>[EMAIL PROTECTED]
>http://clug.ca/mailman/listinfo/clug-talk_clug.ca
>
>
>

_______________________________________________
clug-talk mailing list
[EMAIL PROTECTED]
http://clug.ca/mailman/listinfo/clug-talk_clug.ca


_______________________________________________
clug-talk mailing list
[EMAIL PROTECTED]
http://clug.ca/mailman/listinfo/clug-talk_clug.ca

Reply via email to