urity@lists.debian.org
# Subject: Re: New IIS worm
#
#
# On Sun, Sep 23, 2001 at 02:08:40PM +1000, Sam Couter wrote:
# > Karl E. Jorgensen <[EMAIL PROTECTED]> wrote:
# > > Doesn't this leave you open to DOS attacks? I'm thinking
# that source IP
# > > addresses are re
ECTED]
# Subject: Re: New IIS worm
#
#
# On Sun, Sep 23, 2001 at 02:08:40PM +1000, Sam Couter wrote:
# > Karl E. Jorgensen <[EMAIL PROTECTED]> wrote:
# > > Doesn't this leave you open to DOS attacks? I'm thinking
# that source IP
# > > addresses are relatively eas
On Sun, Sep 23, 2001 at 02:08:40PM +1000, Sam Couter wrote:
> Karl E. Jorgensen <[EMAIL PROTECTED]> wrote:
> > Doesn't this leave you open to DOS attacks? I'm thinking that source IP
> > addresses are relatively easy to forge, and hence an attacher can forge
> > a nimda attach and cause you to bloc
On Sun, Sep 23, 2001 at 02:08:40PM +1000, Sam Couter wrote:
> Karl E. Jorgensen <[EMAIL PROTECTED]> wrote:
> > Doesn't this leave you open to DOS attacks? I'm thinking that source IP
> > addresses are relatively easy to forge, and hence an attacher can forge
> > a nimda attach and cause you to blo
Karl E. Jorgensen <[EMAIL PROTECTED]> wrote:
> Doesn't this leave you open to DOS attacks? I'm thinking that source IP
> addresses are relatively easy to forge, and hence an attacher can forge
> a nimda attach and cause you to block off legitimate IP addresses -
> ie. your DNS server our default ga
Karl E. Jorgensen <[EMAIL PROTECTED]> wrote:
> Doesn't this leave you open to DOS attacks? I'm thinking that source IP
> addresses are relatively easy to forge, and hence an attacher can forge
> a nimda attach and cause you to block off legitimate IP addresses -
> ie. your DNS server our default g
Message-
> > > From: Emmanuel Valliet [mailto:[EMAIL PROTECTED]
> > > Sent: Tuesday, September 18, 2001 8:09 PM
> > > To: debian-security@lists.debian.org
> > > Subject: Re: New IIS worm
> > >
> > > (2001-09-18) Emmanuel Valliet sed :
> > &
essage-
> > > From: Emmanuel Valliet [mailto:[EMAIL PROTECTED]]
> > > Sent: Tuesday, September 18, 2001 8:09 PM
> > > To: [EMAIL PROTECTED]
> > > Subject: Re: New IIS worm
> > >
> > > (2001-09-18) Emmanuel Valliet sed :
> > > | I
* Johann Schwarzmeier ([EMAIL PROTECTED]) [010921 14:25]:
> Hello,
>
> Hint: see wat iv'ed done:
>
> /etc/apache/srm.conf:
> Alias /c/winnt/system32/cmd.exe /usr/lib/cgi-bin/block.cgi
> Alias /d/winnt/system32/cmd.exe /usr/lib/cgi-bin/block.cgi
>
> The CGI:
>
> echo "You come from : ${REMOTE_A
* Johann Schwarzmeier ([EMAIL PROTECTED]) [010921 14:25]:
> Hello,
>
> Hint: see wat iv'ed done:
>
> /etc/apache/srm.conf:
> Alias /c/winnt/system32/cmd.exe /usr/lib/cgi-bin/block.cgi
> Alias /d/winnt/system32/cmd.exe /usr/lib/cgi-bin/block.cgi
>
> The CGI:
>
> echo "You come from : ${REMOTE_
he hosts.deny file for this also, no?
>
> Best Regards, Allen
>
> > -Original Message-
> > From: Emmanuel Valliet [mailto:[EMAIL PROTECTED]
> > Sent: Tuesday, September 18, 2001 8:09 PM
> > To: debian-security@lists.debian.org
> > Subject: Re: New IIS
he hosts.deny file for this also, no?
>
> Best Regards, Allen
>
> > -Original Message-
> > From: Emmanuel Valliet [mailto:[EMAIL PROTECTED]]
> > Sent: Tuesday, September 18, 2001 8:09 PM
> > To: [EMAIL PROTECTED]
> > Subject: Re: New IIS worm
> >
You could use the hosts.deny file for this also, no?
Best Regards, Allen
> -Original Message-
> From: Emmanuel Valliet [mailto:[EMAIL PROTECTED]
> Sent: Tuesday, September 18, 2001 8:09 PM
> To: debian-security@lists.debian.org
> Subject: Re: New IIS worm
>
>
&g
You could use the hosts.deny file for this also, no?
Best Regards, Allen
> -Original Message-
> From: Emmanuel Valliet [mailto:[EMAIL PROTECTED]]
> Sent: Tuesday, September 18, 2001 8:09 PM
> To: [EMAIL PROTECTED]
> Subject: Re: New IIS worm
>
>
> (2001-09-
(2001-09-18) Emmanuel Valliet sed :
|
| I know we don't care on linux, but I have reallly a lot of hits from
| machine querying for the ..%%35c../winnt/system32/cmd.exe and Cie.
| And it starts to make a lot of apache childs, and the global charge
| grows consequently.
| Is there a way to pr
I know we don't care on linux, but I have reallly a lot of hits from
machine querying for the ..%%35c../winnt/system32/cmd.exe and Cie.
And it starts to make a lot of apache childs, and the global charge
grows consequently.
Is there a way to protect from that ?
Using an apache configuration trick
(2001-09-18) Emmanuel Valliet sed :
|
| I know we don't care on linux, but I have reallly a lot of hits from
| machine querying for the ..%%35c../winnt/system32/cmd.exe and Cie.
| And it starts to make a lot of apache childs, and the global charge
| grows consequently.
| Is there a way to p
I know we don't care on linux, but I have reallly a lot of hits from
machine querying for the ..%%35c../winnt/system32/cmd.exe and Cie.
And it starts to make a lot of apache childs, and the global charge
grows consequently.
Is there a way to protect from that ?
Using an apache configuration trick
18 matches
Mail list logo