The argument you are using is a general one, saying security doesn't come from obscurity. While this is meaningful in a broad sense, in real life scenarios obscurity often improves already existing security. The problem is that all but a few mistake one for the other and that this misunderstanding in turn leads to security problems.

The less information you reveal of a system, the more difficult it is to mount attacks. This is true for script-kiddies and sophisticated hackers alike so try to avoid leaving fingerprints if you can. Trying to blindly exploit a found problem in an unknown application on an unknown platform can be near impossible. Being able to deduce the OS, analyze the application code, and replicate the system can make even a one-shot-only attempt trivial.

Nothing will make your "sophisticated hackers" more happy than discovering a non-standard open-source attack surface. In the absolute majority of the cases these are not audited or mature, and will break when you pick them apart. Not being able to fingerprint them makes it a totally different problem.

I'm guessing you won't accept me saying this since you claim a greater understanding in the matter than you should, so I'll just say this once and then stay out of the discussion.

Kind regards,
Fredrik Widlund

Joshua Slive skrev:
On 1/24/07, Richard de Vries <[EMAIL PROTECTED]> wrote:

I have modsecurity running on my apache instances, and
I often see all kinds of IIS exploits hitting my box.
This then gives me time to look thru my various apache
and firewall logs, and take some corrective measures
like for instance slapping some IPTables rules on the
box to block that IP.

Have you looked at some of the previous threads on this topic? I'm guessing no.

Have you ever investigated how many people who DO NOT hide their
apache Server identity also get hit by huge quantities of IIS attacks?
The number is close to 100% from my observations.

Here's the trick: There are basically two types of "crackers" you need
to worry about, script-kiddies, and sophisticated hackers.  The first
type will try every possible exploit on every server they can find;
they rarely if ever bother to look at the Server header or anything
else.  The latter type can easily figure out what kind of server
you're running very unobtrusively whether or not you display the
Server header.  So in neither case will hiding the Server header buy
you anything at all.

Your argument seems to be that there may be a small number of crackers
in between those two groups that might be delayed by a few minutes if
you hide your Server header.  I don't see any evidence that such
crackers actually exist.  And even if they did, your time would be
much better spent worrying about real security issues than putting a
tiny roadblock in their way.

Joshua.

---------------------------------------------------------------------
The official User-To-User support forum of the Apache HTTP Server Project.
See <URL:http://httpd.apache.org/userslist.html> for more info.
To unsubscribe, e-mail: [EMAIL PROTECTED]
  "   from the digest: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]


---------------------------------------------------------------------
The official User-To-User support forum of the Apache HTTP Server Project.
See <URL:http://httpd.apache.org/userslist.html> for more info.
To unsubscribe, e-mail: [EMAIL PROTECTED]
  "   from the digest: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to