Re: 404 - Might there be something wrong with my permissions?

2013-11-21 Thread Konstantin Kolinko
and as a MYAPP-webapp-1.0.0.war-file Now I have stripped the app down to just a struts2-hello-world-app. But at the webhotel I just keep getting this when I try to access the ActionClass through struts.xml: HTTP Status 404 - There is no Action mapped for namespace [/] and action name

RE: 404 - Might there be something wrong with my permissions?

2013-11-21 Thread Fredrik Andersson
Date: Thu, 21 Nov 2013 17:10:58 +0400 Subject: Re: 404 - Might there be something wrong with my permissions? From: knst.koli...@gmail.com To: users@tomcat.apache.org 2013/11/21 Fredrik Andersson fredan...@hotmail.com: Hello Tomcat-experts! It is hard to read you message. I have

RE: 404 - Might there be something wrong with my permissions?

2013-11-21 Thread Fredrik Andersson
Hello guys! I started my tomcat at home with catalina.bat start -security. During startup I at once got a lot of exceptions, please see this pastie:http://pastie.org/8499210 When I try to access the webapp I get 404 right away.At the production server I at least could access the jsp:s direct

404 - Might there be something wrong with my permissions?

2013-11-20 Thread Fredrik Andersson
-world-app. But at the webhotel I just keep getting this when I try to access the ActionClass through struts.xml: HTTP Status 404 - There is no Action mapped for namespace [/] and action name [welcome] associated with context path [/MYAPP-webapp-1.0.0].type Status reportmessage There is no Action

Re: apache tomcat 8.0.0-rc1; /manager 404; NPE

2013-08-07 Thread jieryn
On Tue, Aug 6, 2013 at 11:34 PM, Christopher Schultz ch...@christopherschultz.net wrote: The servlet specification requires that certain services be provided by the container. Among them are a) a default servlet to serve content for which no other servlet mapping exists (e.g. static files,

RE: apache tomcat 8.0.0-rc1; /manager 404; NPE

2013-08-07 Thread Caldarale, Charles R
From: jieryn [mailto:jie...@gmail.com] Subject: Re: apache tomcat 8.0.0-rc1; /manager 404; NPE so what is the point of keeping the global conf/web.xml.. To allow Tomcat to work. If we changed the name to conf/do_not_delete.xml, would that satisfy you? - Chuck THIS COMMUNICATION MAY

Re: apache tomcat 8.0.0-rc1; /manager 404; NPE

2013-08-07 Thread jieryn
Greetings, On Wed, Aug 7, 2013 at 9:58 AM, Caldarale, Charles R chuck.caldar...@unisys.com wrote: To allow Tomcat to work. If we changed the name to conf/do_not_delete.xml, would that satisfy you? I think you've quite severely missed the point of the entire discussion which I've raised.

Re: apache tomcat 8.0.0-rc1; /manager 404; NPE

2013-08-07 Thread Mark Thomas
On 07/08/2013 15:46, jieryn wrote: On Tue, Aug 6, 2013 at 11:34 PM, Christopher Schultz ch...@christopherschultz.net wrote: The servlet specification requires that certain services be provided by the container. Among them are a) a default servlet to serve content for which no other servlet

Re: apache tomcat 8.0.0-rc1; /manager 404; NPE

2013-08-07 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Jieryn, On 8/7/13 10:02 AM, jieryn wrote: Greetings, On Wed, Aug 7, 2013 at 9:58 AM, Caldarale, Charles R chuck.caldar...@unisys.com wrote: To allow Tomcat to work. If we changed the name to conf/do_not_delete.xml, would that satisfy you?

apache tomcat 8.0.0-rc1; /manager 404; NPE

2013-08-06 Thread jieryn
When I try to hit the /manager application from a browser without specifying /html, the following NPE ends up in the log, but the browser sees what appears to be a typical tomcat 404 error page without exposing the full trace: == logs/access_log.2013-08-06 == a.b.c.d - - [06/Aug/2013:14:37:52

Re: apache tomcat 8.0.0-rc1; /manager 404; NPE

2013-08-06 Thread Mark Thomas
On 06/08/2013 20:46, jieryn wrote: When I try to hit the /manager application from a browser without specifying /html, the following NPE ends up in the log, but the browser sees what appears to be a typical tomcat 404 error page without exposing the full trace: I can't repeat

Re: apache tomcat 8.0.0-rc1; /manager 404; NPE

2013-08-06 Thread jieryn
404 error page without exposing the full trace: I can't repeat this with a clean installation. Please provide the steps to reproduce from a clean 8.0.0-RC1 install. Remove the ${catalina.home}/conf/web.xml file and restart the server. With Apache Tomcat 7.x there was no need for this conf

Re: apache tomcat 8.0.0-rc1; /manager 404; NPE

2013-08-06 Thread Mark Thomas
sees what appears to be a typical tomcat 404 error page without exposing the full trace: I can't repeat this with a clean installation. Please provide the steps to reproduce from a clean 8.0.0-RC1 install. Remove the ${catalina.home}/conf/web.xml file and restart the server. With Apache Tomcat

Re: apache tomcat 8.0.0-rc1; /manager 404; NPE

2013-08-06 Thread jieryn
Greetings, On Tue, Aug 6, 2013 at 4:53 PM, Mark Thomas ma...@apache.org wrote: The Tomcat 7.0.x behaviour is identical to Tomcat 8.0.x. The root cause of the stack trace in both versions is the missing configuration for the JSP servlet. Ok, since the manager application already provides a

Re: apache tomcat 8.0.0-rc1; /manager 404; NPE

2013-08-06 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Jieryn, On 8/6/13 10:00 PM, jieryn wrote: Greetings, On Tue, Aug 6, 2013 at 4:53 PM, Mark Thomas ma...@apache.org wrote: The Tomcat 7.0.x behaviour is identical to Tomcat 8.0.x. The root cause of the stack trace in both versions is the

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-22 Thread André Warnier
-404 responses, while bots - by the very nature of what they are looking for - receive many 404 responses. So anything that would in some way penalise 404 responses with respect to other ones, should impact bots much more than normal clients 3) setting up a bot to perform such a scanning operation has

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-22 Thread chris derham
But honestly, I am also a bit at a loss now as to how to continue. There is of course no way for me to prove the validity of the scheme by installing it on 31 million (20%) of webservers on the Internet and looking at the resulting bot activity patterns to confirm my suspicions. Try to enter

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-22 Thread André Warnier
chris derham wrote: But honestly, I am also a bit at a loss now as to how to continue. There is of course no way for me to prove the validity of the scheme by installing it on 31 million (20%) of webservers on the Internet and looking at the resulting bot activity patterns to confirm my

RE: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-22 Thread Leo Donahue - RDSA IT
-Original Message- From: Howard W. Smith, Jr. [mailto:smithh032...@gmail.com] Subject: Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404 also, if an 'ANN' email was sent, where /expert tomcat/ users can derive/develop a list of the popular/frequent URLs

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-22 Thread André Warnier
Leo Donahue - RDSA IT wrote: -Original Message- From: Howard W. Smith, Jr. [mailto:smithh032...@gmail.com] Subject: Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404 also, if an 'ANN' email was sent, where /expert tomcat/ users can derive/develop a list

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-22 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Chris, On 4/20/13 6:08 PM, chris derham wrote: I think that you have articulated your suggestion very well. I think you have weighed the pros well and been open to debate. Personally I just don't think what you propose will have the effect that

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-22 Thread André Warnier
. Excluding the pauses thus, it took this bot 36 x 10 ms = 0.36 s real time to scan the 36 URLs (excluding network latency, which is probably about 50 ms per URL). If the server added an average 1 s pause to each 404 response, it would have taken the bot 36 seconds real time to make the same scan

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-22 Thread Christopher Schultz
an average 1 s pause to each 404 response, it would have taken the bot 36 seconds real time to make the same scan. That is 100 times more. Yes, but the attacker has more source ports than you have destination ports, can run in parallel, and doesn't really care if you delay him. Your proposal

RE: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-21 Thread Esmond Pitt
addresses can even connect to /manager, let alone access it. Apache HTTPD doesn't give a 404, it just closes the connection. No exposure, no wasted threads, no wasted sockets, nothing. EJP - To unsubscribe, e-mail: users-unsubscr

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-21 Thread André Warnier
, that's like using a B-52 to kill a mouse. Why not just properly shielding the manager application at the Tomcat level ? Apache HTTPD doesn't give a 404, it just closes the connection. Would you kindly explain how you got Apache httpd to do that ? Off the top of my head, I do not know of any

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-20 Thread André Warnier
Mark H. Wood wrote: On Wed, Apr 17, 2013 at 01:24:04PM -0500, Caldarale, Charles R wrote: From: Leo Donahue - RDSA IT [mailto:leodona...@mail.maricopa.gov] Subject: RE: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404 So you are saying it could be possible to know

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-20 Thread André Warnier
] Subject: Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404 That's the idea. That is one reason why I brought this discussion here : to check if, if the default factory setting was for example 1000 ms delay for each 404 answer, could anyone think of a severe detrimental side

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-20 Thread André Warnier
André Warnier wrote: Mark H. Wood wrote: On Wed, Apr 17, 2013 at 01:24:04PM -0500, Caldarale, Charles R wrote: From: Leo Donahue - RDSA IT [mailto:leodona...@mail.maricopa.gov] Subject: RE: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404 So you are saying it could

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-20 Thread David Kerber
On 4/20/2013 7:29 AM, André Warnier wrote: ... Addendum : actually, as far as 4xx codes go, a bit more discrimination is needed. A 401 response (Auth required) for example, should not be slowed down, as it is part of a normal authentication cycle. There may be others like that. Well, Java

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-20 Thread chris derham
them, and just protecting one's own servers against them doesn't stop them in a general sense. 2) there is a fundamental asymmetry between how bots access a server (and most of the responses that they get), and how normal clients access a server : normal clients receive mostly non-404 responses

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-20 Thread Howard W. Smith, Jr.
On Sat, Apr 20, 2013 at 7:22 AM, André Warnier a...@ice-sa.com wrote: 5) if the scheme works, and it does the effect of making this type of server-scanning uneconomical, bot developers will look for other ways to find vulnerable targets. IMHO, I don't see why bots will get 'turned off' by

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-19 Thread Howard W. Smith, Jr.
On Thu, Apr 18, 2013 at 12:26 PM, André Warnier a...@ice-sa.com wrote: My contention is that this would be self-defeating for the bots. 91.121.172.164 - - [03/Apr/2013:08:19:50 +0200] GET /robots.txt HTTP/1.1 404 360 - Mozilla/5.0 (Windows; U; MSIE 7.0; Windows NT 6.0; en-US) I

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-19 Thread Mark H. Wood
: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404 That's the idea. That is one reason why I brought this discussion here : to check if, if the default factory setting was for example 1000 ms delay for each 404 answer, could anyone think of a severe detrimental side

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-19 Thread Mark H. Wood
On Wed, Apr 17, 2013 at 01:24:04PM -0500, Caldarale, Charles R wrote: From: Leo Donahue - RDSA IT [mailto:leodona...@mail.maricopa.gov] Subject: RE: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404 So you are saying it could be possible to know in advance

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-18 Thread André Warnier
to eachother; each one of them probes for some known vulnerability, but it is not so that if one URL results in a 404, any of the others would, or vice-versa. So this is 3,000,000 URLs to try, no matter what. And say that by a stroke of bad luck, all of these 100,000 hosts have been well-configured

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-17 Thread Mark H. Wood
On Tue, Apr 16, 2013 at 01:57:55PM -0300, chris derham wrote: Or, another way of looking at this would be that for every 40 servers scanned without a 404 delay, the same bot infrastructure within the same time would only be able to scan 1 server if a 1 s 404 delay was implemented by 50

RE: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-17 Thread Leo Donahue - RDSA IT
-Original Message- From: André Warnier [mailto:a...@ice-sa.com] Subject: Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404 That's the idea. That is one reason why I brought this discussion here : to check if, if the default factory setting was for example 1000

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-17 Thread chris derham
after a little scripting of a sql injection and some perusal of the results. If you deliberately delay 404 by a known amount of time, it will still stick out, and they can use this just as much as a positive indication. HTH somebody Chris

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-17 Thread André Warnier
Leo Donahue - RDSA IT wrote: -Original Message- From: André Warnier [mailto:a...@ice-sa.com] Subject: Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404 That's the idea. That is one reason why I brought this discussion here : to check if, if the default

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-17 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 André, On 4/17/13 1:27 PM, André Warnier wrote: Leo Donahue - RDSA IT wrote: -Original Message- From: André Warnier [mailto:a...@ice-sa.com] Subject: Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-17 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Mark, On 4/17/13 8:49 AM, Mark H. Wood wrote: Yes. But someone *does* own the botted computers, and their own operations are slightly affected. I have wondered if there is some way to make a bot so intrusive that many more owners will ask

RE: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-17 Thread Leo Donahue - RDSA IT
-Original Message- From: André Warnier [mailto:a...@ice-sa.com] Sent: Wednesday, April 17, 2013 10:28 AM To: Tomcat Users List Subject: Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404 Leo Donahue - RDSA IT wrote: -Original Message- From: André Warnier

RE: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-17 Thread Leo Donahue - RDSA IT
-Original Message- From: Christopher Schultz [mailto:ch...@christopherschultz.net] Subject: Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404 -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Mark, On 4/17/13 8:49 AM, Mark H. Wood wrote: Yes. But someone *does

RE: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-17 Thread Caldarale, Charles R
From: Leo Donahue - RDSA IT [mailto:leodona...@mail.maricopa.gov] Subject: RE: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404 So you are saying it could be possible to know in advance that certain requests are for repeated requests of nothing or being made

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-17 Thread André Warnier
bots, and you want (collectively) to have them scan 100,000 hosts in total, each one for 30 known buggy URLs. These 30 URLs are unrelated to eachother; each one of them probes for some known vulnerability, but it is not so that if one URL results in a 404, any of the others would, or vice-versa

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-17 Thread Konstantin Kolinko
- - [09/Apr/2013:19:26:58 -0400] HEAD /manager/html HTTP/1.0 404 - By the way 1) I think just feeding the default ROOT webapp to a Google bot or Baidu will result in such requests coming from search bots for awhile. That is because ROOT/index.jsp has links to the Manager application. It looks

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-17 Thread André Warnier
/html HTTP/1.0 404 That's the idea. That is one reason why I brought this discussion here : to check if, if the default factory setting was for example 1000 ms delay for each 404 answer, could anyone think of a severe detrimental side-effect ? What if I send 10,000 requests to your server for some

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-17 Thread André Warnier
Leo Donahue - RDSA IT wrote: -Original Message- From: André Warnier [mailto:a...@ice-sa.com] Sent: Wednesday, April 17, 2013 10:28 AM To: Tomcat Users List Subject: Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404 Leo Donahue - RDSA IT wrote: -Original

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-17 Thread André Warnier
in the log: 113.11.200.30 - - [09/Apr/2013:19:26:58 -0400] HEAD /manager/html HTTP/1.0 404 - By the way 1) I think just feeding the default ROOT webapp to a Google bot or Baidu will result in such requests coming from search bots for awhile. That is because ROOT/index.jsp has links

RE: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-17 Thread Leo Donahue - RDSA IT
-Original Message- From: André Warnier [mailto:a...@ice-sa.com] Subject: Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404 So you are saying it could be possible to know in advance that certain requests are for repeated requests of nothing or being made

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-17 Thread André Warnier
Leo Donahue - RDSA IT wrote: -Original Message- From: André Warnier [mailto:a...@ice-sa.com] Subject: Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404 So you are saying it could be possible to know in advance that certain requests are for repeated requests

Re: [OT] Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-17 Thread André Warnier
Leo Donahue - RDSA IT wrote: ... [Way OT...] If you get this to work, then the next place you can take this idea is to the phone company. Why should my phone even ring at all if I know the caller is from an 800 number... or from some other list of people I don't care to talk to ... I would

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-17 Thread Howard W. Smith, Jr.
it. :) Trying to catch up on all the responses. I wanted to respond to a few other posts, but thought I might keep reading. Now, I will go back to reading more of the responses. If you deliberately delay 404 by a known amount of time, it will still stick out, and they can use this just as much

RE: [OT] Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-17 Thread Leo Donahue - RDSA IT
-Original Message- From: André Warnier [mailto:a...@ice-sa.com] Subject: Re: [OT] Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404 Leo Donahue - RDSA IT wrote: ... [Way OT...] If you get this to work, then the next place you can take this idea is to the phone

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-17 Thread Howard W. Smith, Jr.
On Wed, Apr 17, 2013 at 1:59 PM, Leo Donahue - RDSA IT leodona...@mail.maricopa.gov wrote: -Original Message- From: Christopher Schultz [mailto:ch...@christopherschultz.net] Subject: Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404 People *do* do

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-17 Thread Howard W. Smith, Jr.
their best to 'always' have the latest-n-greatest version of tomcat. So, even if 'delay 404' was added, I don't think many of the already-existing apache/tomcat websites will have this new 'delay 404' feature. :) Also, the 'delay 404' basically requires a possible change or release note that says

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-17 Thread Howard W. Smith, Jr.
On Wed, Apr 17, 2013 at 3:45 PM, Leo Donahue - RDSA IT leodona...@mail.maricopa.gov wrote: Not knowing anything about the history of the HTTP 404 method, if a server does not find a matching request URI, why was it decided that the protocol would even respond at all? Seems like the request

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-17 Thread chris derham
probes for some known vulnerability, but it is not so that if one URL results in a 404, any of the others would, or vice-versa. So this is 3,000,000 URLs to try, no matter what. And say that by a stroke of bad luck, all of these 100,000 hosts have been well-configured, and that none

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-16 Thread Mark H. Wood
On Mon, Apr 15, 2013 at 07:15:11PM +0200, André Warnier wrote: Neven Cvetkovic wrote: How about creating a fake manager application :))) That takes X minutes/seconds to get back a 404 ;))) [snip] Of course at the moment I am just fishing here for potential negative side-effects. Search

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-16 Thread André Warnier
Mark H. Wood wrote: On Mon, Apr 15, 2013 at 07:15:11PM +0200, André Warnier wrote: Neven Cvetkovic wrote: How about creating a fake manager application :))) That takes X minutes/seconds to get back a 404 ;))) [snip] Of course at the moment I am just fishing here for potential negative side

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-16 Thread chris derham
Or, another way of looking at this would be that for every 40 servers scanned without a 404 delay, the same bot infrastructure within the same time would only be able to scan 1 server if a 1 s 404 delay was implemented by 50% of the webservers. This assumes that the scanning software makes

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-16 Thread David kerber
On 4/16/2013 12:57 PM, chris derham wrote: Or, another way of looking at this would be that for every 40 servers scanned without a 404 delay, the same bot infrastructure within the same time would only be able to scan 1 server if a 1 s 404 delay was implemented by 50% of the webservers

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-16 Thread Pïd stèr
On 16 Apr 2013, at 17:58, chris derham ch...@derham.me.uk wrote: Or, another way of looking at this would be that for every 40 servers scanned without a 404 delay, the same bot infrastructure within the same time would only be able to scan 1 server if a 1 s 404 delay was implemented by 50

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-16 Thread André Warnier
chris derham wrote: Or, another way of looking at this would be that for every 40 servers scanned without a 404 delay, the same bot infrastructure within the same time would only be able to scan 1 server if a 1 s 404 delay was implemented by 50% of the webservers. This assumes

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-16 Thread André Warnier
Pïd stèr wrote: On 16 Apr 2013, at 17:58, chris derham ch...@derham.me.uk wrote: Or, another way of looking at this would be that for every 40 servers scanned without a 404 delay, the same bot infrastructure within the same time would only be able to scan 1 server if a 1 s 404 delay

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-16 Thread Pïd stèr
On 16 Apr 2013, at 19:38, André Warnier a...@ice-sa.com wrote: Pïd stèr wrote: On 16 Apr 2013, at 17:58, chris derham ch...@derham.me.uk wrote: Or, another way of looking at this would be that for every 40 servers scanned without a 404 delay, the same bot infrastructure within the same time

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-16 Thread David kerber
to introduce this 404-delay, we could hire a botnet to distribute the patch ? Mmmm, maybe there is another idea there : how about an anti-botnet botnet ? Microsoft already works with the DOJ and DHS occasionally doing something like this. It has been a while, but I have seen articles referring

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-16 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 André, On 4/16/13 2:37 PM, André Warnier wrote: Say that it would be easy to implement this in Tomcat, and that we do not collectively find good reasons not to do so, and that it does get implemented. Then I pledge that my next move would be

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-16 Thread Christopher Schultz
servers to make the virus statistically ineffective. Maybe if we find a simple patch to Tomcat to introduce this 404-delay, we could hire a botnet to distribute the patch ? Mmmm, maybe there is another idea there : how about an anti-botnet botnet ? Microsoft already works with the DOJ

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-16 Thread André Warnier
Pïd stèr wrote: On 16 Apr 2013, at 19:38, André Warnier a...@ice-sa.com wrote: Pïd stèr wrote: On 16 Apr 2013, at 17:58, chris derham ch...@derham.me.uk wrote: Or, another way of looking at this would be that for every 40 servers scanned without a 404 delay, the same bot infrastructure

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-16 Thread André Warnier
Christopher Schultz wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 André, On 4/16/13 2:37 PM, André Warnier wrote: Say that it would be easy to implement this in Tomcat, and that we do not collectively find good reasons not to do so, and that it does get implemented. Then I pledge

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-16 Thread André Warnier
proportion of vaccinated servers to make the virus statistically ineffective. Maybe if we find a simple patch to Tomcat to introduce this 404-delay, we could hire a botnet to distribute the patch ? Mmmm, maybe there is another idea there : how about an anti-botnet botnet ? Microsoft already works

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-15 Thread Pid
On 15/04/2013 00:03, Christopher Schultz wrote: Pid, On 4/12/13 1:54 PM, Pïd stèr wrote: On 11 Apr 2013, at 21:36, Christopher Schultz ch...@christopherschultz.net wrote: [...] though I would run Apache httpd and Tomcat on different hosts, so localhost-binding is not possible unless you

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-15 Thread Pid
On 15/04/2013 03:51, Esmond Pitt wrote: I agree with your comment. Adding a second box for Tomcat only means I also have to configure a firewall between them, whereas using 127.0.0.x for Tomcat protects it completely. No it doesn't! Obfuscation or indirection != security. HTTPD doesn't

RE: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-15 Thread Esmond Pitt
' Subject: Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404 On 15/04/2013 03:51, Esmond Pitt wrote: I agree with your comment. Adding a second box for Tomcat only means I also have to configure a firewall between them, whereas using 127.0.0.x for Tomcat protects

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-15 Thread Pid
HTTP/1.0 404 On 15/04/2013 03:51, Esmond Pitt wrote: I agree with your comment. Adding a second box for Tomcat only means I also have to configure a firewall between them, whereas using 127.0.0.x for Tomcat protects it completely. No it doesn't! Obfuscation or indirection != security

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-15 Thread Howard W. Smith, Jr.
On Mon, Apr 15, 2013 at 7:49 AM, Pid p...@pidster.com wrote: I'm persisting in this point because I don't want other users to continue believing the fallacy that 'hiding' Tomcat behind Apache HTTPD alone improves their security. And your persistence is appreciated, and I definitely

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-15 Thread Mark Eggers
On 4/15/2013 3:19 AM, Pid wrote: On 15/04/2013 00:03, Christopher Schultz wrote: Pid, On 4/12/13 1:54 PM, Pïd stèr wrote: On 11 Apr 2013, at 21:36, Christopher Schultz ch...@christopherschultz.net wrote: [...] though I would run Apache httpd and Tomcat on different hosts, so

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-15 Thread Pid
On 15/04/2013 16:11, Mark Eggers wrote: On 4/15/2013 3:19 AM, Pid wrote: On 15/04/2013 00:03, Christopher Schultz wrote: Pid, On 4/12/13 1:54 PM, Pïd stèr wrote: On 11 Apr 2013, at 21:36, Christopher Schultz ch...@christopherschultz.net wrote: [...] though I would run Apache httpd and

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-15 Thread André Warnier
/html HTTP/1.0 404 On 15/04/2013 03:51, Esmond Pitt wrote: I agree with your comment. Adding a second box for Tomcat only means I also have to configure a firewall between them, whereas using 127.0.0.x for Tomcat protects it completely. No it doesn't! Obfuscation or indirection != security. HTTPD

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-15 Thread André Warnier
on properly-configured servers, and thus ultimately result in a 404 Not Found response. It is also the interest of these annoying tools to be able to scan as many IP addresses and ports as possible, within as short a time as possible, in order to locate vulnerable targets faster. But nevertheless

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-15 Thread Neven Cvetkovic
How about creating a fake manager application :))) That takes X minutes/seconds to get back a 404 ;)))

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-15 Thread André Warnier
Neven Cvetkovic wrote: How about creating a fake manager application :))) That takes X minutes/seconds to get back a 404 ;))) Just for the sake of the discussion : - a fake manager application would apply to just the /manager webapp, not to other potential hacking targets, no ? (or you

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-15 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Pid, On 4/15/13 6:19 AM, Pid wrote: On 15/04/2013 00:03, Christopher Schultz wrote: Pid, On 4/12/13 1:54 PM, Pïd stèr wrote: On 11 Apr 2013, at 21:36, Christopher Schultz ch...@christopherschultz.net wrote: [...] though I would run Apache

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-15 Thread Mark Eggers
On 4/15/2013 10:15 AM, André Warnier wrote: Neven Cvetkovic wrote: How about creating a fake manager application :))) That takes X minutes/seconds to get back a 404 ;))) Just for the sake of the discussion : - a fake manager application would apply to just the /manager webapp, not to other

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-14 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Esmond, On 4/11/13 8:43 PM, Esmond Pitt wrote: I referred to the OpenLDAP lockout mechanism, which is not at all primitive. How does OpenLDAP do better than Tomcat? If I make repeated (failed) login attempts against a single user, can I cause

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-14 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Pid, On 4/12/13 1:54 PM, Pïd stèr wrote: On 11 Apr 2013, at 21:36, Christopher Schultz ch...@christopherschultz.net wrote: [...] though I would run Apache httpd and Tomcat on different hosts, so localhost-binding is not possible unless you are

RE: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-14 Thread Esmond Pitt
I agree with your comment. Adding a second box for Tomcat only means I also have to configure a firewall between them, whereas using 127.0.0.x for Tomcat protects it completely. No it doesn't! Obfuscation or indirection != security. HTTPD doesn't magically provide you with some extra

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-13 Thread Pïd stèr
HTTP/1.0 404 On 11 Apr 2013, at 21:36, Christopher Schultz ch...@christopherschultz.net wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Esmond, On 4/10/13 8:21 PM, Esmond Pitt wrote: We had lots of these and finally an attack last year on a Tomcat where the manager password somehow

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-13 Thread Mark Eggers
:54 -0400] GET /apple-touch-icon-precomposed.png HTTP/1.1 404 - 127.0.0.1 - - [10/Apr/2013:20:00:54 -0400] GET /apple-touch-icon.png HTTP/1.1 404 - Also, netbeans IDE and start-stop-tomcat implementation results in the following: 127.0.0.1 - - [10/Apr/2013:20:11:05 -0400] HEAD /netbeans-tomcat

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-13 Thread Howard W. Smith, Jr.
reported this in their Issue Tracker. 127.0.0.1 - - [10/Apr/2013:20:00:54 -0400] GET /apple-touch-icon-precomposed.png HTTP/1.1 404 - 127.0.0.1 - - [10/Apr/2013:20:00:54 -0400] GET /apple-touch-icon.png HTTP/1.1 404 - Also, netbeans IDE and start-stop-tomcat implementation results

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-12 Thread Pïd stèr
On 11 Apr 2013, at 21:36, Christopher Schultz ch...@christopherschultz.net wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Esmond, On 4/10/13 8:21 PM, Esmond Pitt wrote: We had lots of these and finally an attack last year on a Tomcat where the manager password somehow hadn't been

RE: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-11 Thread Jeffrey Janner
-Original Message- From: Howard W. Smith, Jr. [mailto:smithh032...@gmail.com] Sent: Wednesday, April 10, 2013 7:35 PM To: Esmond Pitt Cc: Tomcat Users List Subject: Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404 On Wed, Apr 10, 2013 at 8:21 PM, Esmond

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-11 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Esmond, On 4/10/13 8:21 PM, Esmond Pitt wrote: We had lots of these and finally an attack last year on a Tomcat where the manager password somehow hadn't been changed. Note that the manager webapp has no default passwords, so I wonder what you

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-11 Thread Christopher Schultz
log reveals hack attempt: HEAD /manager/html HTTP/1.0 404 On Wed, Apr 10, 2013 at 8:21 PM, Esmond Pitt esmond.p...@bigpond.comwrote: We had lots of these and finally an attack last year on a Tomcat where the manager password somehow hadn't been changed. The attacker installed a viral

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-11 Thread Howard W. Smith, Jr.
reveals hack attempt: HEAD /manager/html HTTP/1.0 404 On Wed, Apr 10, 2013 at 8:21 PM, Esmond Pitt esmond.p...@bigpond.comwrote: We had lots of these and finally an attack last year on a Tomcat where the manager password somehow hadn't been changed. The attacker installed a viral

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-11 Thread Howard W. Smith, Jr.
: Wednesday, April 10, 2013 7:35 PM To: Esmond Pitt Cc: Tomcat Users List Subject: Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404 On Wed, Apr 10, 2013 at 8:21 PM, Esmond Pitt esmond.p...@bigpond.comwrote: We had lots of these and finally an attack last year

Re: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-11 Thread Konstantin Kolinko
2013/4/12 Christopher Schultz ch...@christopherschultz.net: The attacker installed a viral servlet application that killed the server completely, we had to rebuild it. I -- like most people I would guess -- don't run under a SecurityManager, but doing so can significantly limit the damage

RE: Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-11 Thread Esmond Pitt
You would have had to intentionally enable the default password. I had clearly done that. The attacker installed a viral servlet application that killed the server completely, we had to rebuild it. I -- like most people I would guess -- don't run under a SecurityManager, but doing so can

Tomcat access log reveals hack attempt: HEAD /manager/html HTTP/1.0 404

2013-04-10 Thread Howard W. Smith, Jr.
404 - This is an unfamiliar ip address to me, and I have already prepared the app/tomcat for these type of attacks. How? by removing any/all tomee/tomcat (manager/web) apps. I did that some time ago, when I first migrated from glassfish to tomee/tomcat, and that was the best/easiest way I knew how

<    1   2   3   4   5   6   7   8   9   10   >