First off, you might be better posting this on the apache list 
(http://httpd.apache.org/userslist.html) since I think this primarily a server issue 
(or maybe mod_ssl) - not really openSSL...

Having said that, I can perhaps offer some hints as to what's going on:

- 400 is a "Bad Request"... this occurs when the request doesn't follow the HTTP spec 
(e.g. not GET or POST or HEAD or whatever). 

- 408 is a timeout, usually in response to a request for a CGI program. The duration 
of the timeout is controlled by your "TimeOut" directive in httpd.conf. If you don't 
have one, the default is 300 sec - which is 5 minutes :-)

Note that the report in the log occurs *after* the timeout has expired, so it is not 
that the "attacker" is sending something which generates a 400, then waiting 5 minutes 
then sending something else which generates a 408. What is happening is that the two 
requests are arriving simultaneously but that the response to the 408 request takes 5 
minutes to be logged. 

This all means that the second request (leading to the 408) must be requesting a real 
CGI program on your server. Furthermore, the request is framed such that it causes the 
program to get stuck or in a loop or otherwise take longer than 5 minutes to respond.

The fact that this causes apache to hang is very bad.

- what is the program?
- what does it do?
- what is the request like? 

PS the "GET_CLIENT_MASTER_KEY:key arg too long" message looks like the trap against 
the buffer-overflow exploit in 0.9.6g. But this is being trapped and so I think you 
are safe against it.

>-----Original Message-----
>From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
>Sent: Sonntag, 6. Oktober 2002 02:51
>To: [EMAIL PROTECTED]
>Subject: apache and that whole "bugbear" thing
>
>
>
>Is this the right place to ask questions about the bugbear worm?
>
>On a Sun box, we upgraded openssl to 0.9.6g because of the potential
>for the whole bugbear attack... I realize it's apparently targeted
>at linux, but better safe then sorry... well, we've started getting
>hit with what we think may be attacks... they're not getting through,
>but they cause apache to lock up... it's very strange... the situation
>seems to happen as follows:
>
>We get a couple http requests that return a "400" status... then the
>server stops serving requests... then EXACTLY (every time) 5 minutes
>later, to the second, we get a request that gives a 408 error from
>the same IP, then apache needs to be restarted before it accepts any
>further requests...
>
>until this morning, there has not been much information in the logs...
>but this morning, there were some entries in the ssl_engine_log that
>looked like this:
>
>[05/Oct/2002 02:55:42 00969] [error] SSL handshake timed out 
>(client 66.46.213.130, server XXX.XXX.com:443)
>[05/Oct/2002 02:55:42 00969] [info]  Connection to child 14 
>established (server YYY.YYY.com:443, client 66.46.213.130)
>[05/Oct/2002 02:55:42 00969] [info]  Seeding PRNG with 1160 
>bytes of entropy
>[05/Oct/2002 02:55:42 00969] [error] SSL handshake failed 
>(server YYY.YYY.com:443, client 66.46.213.130) (OpenSSL 
>library error follows)
>[05/Oct/2002 02:55:42 00969] [error] OpenSSL: 
>error:1406B458:SSL routines:GET_CLIENT_MASTER_KEY:key arg too long
>[05/Oct/2002 02:55:42 00969] [info]  Connection to child 14 
>established (server XXX.XXX.com:443, client 66.46.213.130)
>[05/Oct/2002 02:55:42 00969] [info]  Seeding PRNG with 1160 
>bytes of entropy
>
>66.46.213.130 was the ip address that gave the 400's and 408 this
>time around (different IP each time)...
>
>If this is not the best place to ask about this, please point me in
>the right direction... I'm starting to sweat with my boss breathing
>down my next... this is a 24/7 production server, running critical
>web applications that internal and external customers access
>constantly... so any help towards an answer would be greatly
>appreciated...
>
>Thanks.
>Dan.
>
>
>______________________________________________________________________
>OpenSSL Project                                 http://www.openssl.org
>User Support Mailing List                    [EMAIL PROTECTED]
>Automated List Manager                           [EMAIL PROTECTED]
>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to