Nick Tonkin writes:
 > Now that Micro$oft has finally put out some information about their
 > latest trick I have posted a new version of MSIISProbes.pm.
 > 
 > Version 1.02 changes include putting the URL to a page containing info
 > about each worm into a PerlSetVar ... this means that once you have
 > configured MSIISProbes.pm with your e-mail and cacheing preferences, you
 > can add traps for new worms as Micro$oft releases them, er, discovers
 > them.
 > 
 > Available at http://www.tonkinresolutions.com/MSIISProbes.pm.tar.gz
 > 
 > More info at http://www.tonkinresolutions.com/MSIISProbes.pm.html
 
I was looking at your Apache::MSIISProbes module, and I didn't
understand the part about the nimda rewrite rules, mostly because I
haven't used the rewrite rules.  Do the following rules

        RewriteCond %{REQUEST_URI} !nimda
        RewriteCond %{QUERY_STRING} /c.dir
        RewriteRule .* /nimda? [R,L]

mean unless I've already rewritten the rule, if the query string matches
c.dir (i.e., will match c+dir found in most of the requests), rewrite
the request as /nimda?  From my observation, nimbda also tries c+tftp
and tries to get /scripts/Admin.dll, /c/Admin.dll, /d/Admin.dll and
/MSADC/Admin.dll.  Could I change the rewrite rules to 

    RewriteCond %{REQUEST_URI} !nimda 
    RewriteCond %{QUERY_STRING} /c.(tftp|dir)
    RewriteRule .* /nimda? [R,L] 

to catch either request, and then do
    RewriteCond %{REQUEST_URI} /(scripts|MSADC|c|d)/Admin.dll
    RewriteRule .* /nimda? [R,L]
to catch the others?


Thanks.

Reply via email to