I have provided a translation.  See my message.  I agree he should have
continued in the language of this newsgroup.



Sander Temme wrote:
> On Jul 12, 2011, at 1:37 AM, Patrick Proniewski wrote:
> 
>> Hi,
>>
>> Apache servers are not victims of phishing attacks.
>> Users are victims of phishing attacks.
>>
>> As the OP is french, I'm continuing in french:
> 
> Patrick, remember that one of the reasons we have these conversations on a 
> mailinglist is that others can also benefit from the information exchanged.  
> You're not just talking to Frank, you're talking to all of us.  Keeping the 
> conversation in English will ensure maximum benefit.
> 
> Thank you, 
> 
> S.
> 
>> Comme je ne dis plus haut, tes serveurs ne peuvent pas être victimes d'une 
>> attaque de phishing. Un phishing c'est une attaque par abus de confiance (ou 
>> de bêtise), et ça se situe donc directement au niveau de l'utilisateur.
>> Le seul moyen de lutter contre le phishing c'est d'éduquer les utilisateurs. 
>> Tu peux toujours proposer des services en https, si les utilisateurs se 
>> moquent de la validité des certificats, c'est mort.
>>
>> Tu ne donnes pas assez de détails pour qu'on puisse comprendre ce qu'il 
>> s'est passé, donc impossible de te donner des pointeurs vers de la doc. 
>> Quoi qu'il en soit, si les utilisateurs ont été dirigés à leur insu vers un 
>> serveur "pirate", il n'existe aucune configuration d'apache qui peut les 
>> protéger, puisque par définition, les utilisateurs arrivent sur un serveur 
>> qui n'est pas le tien.
>>
>> On 12 juil. 2011, at 10:20, Frank Bonnet wrote:
>>
>>> Hello
>>>
>>> Few weeks ago we discovered that two of our apache servers
>>> has been victims of phishing attack.
>>>
>>> The first one is running squirrelmail webmail and the second one
>>> in running our extranet services for students and professors.
>>>
>>> Both of them are using https and require authentication.
>>>
>>> The two phising pages had the same look and feel than original servers
>>> of course !
>>>
>>> The "traps" has been used to grab users's login and passwords as usual.
>>>
>>> The attack has been performed by "real" hackers that have been paid
>>> by some students to hack passwords of "interresting" people.
>>> maybe some hacked DNS or Internet routers has been compromised/used ?
>>>
>>> I would be VERY interrested by ANY documentation about that kind
>>> of phising techniques and HOW to fight them ( if possible ) also
>>> I would be interrested by any apache gurus advices ...
>>> Would it be possible to configure something in apache to track down
>>> that kind of problem ? any log analyzer that could help ?
>>>
>>> Thank you very much
>> Patrick PRONIEWSKI
>> -- 
>> Administrateur Système - DSI - Université Lumière Lyon 2
>>
> 
> 
> ---------------------------------------------------------------------
> The official User-To-User support forum of the Apache HTTP Server Project.
> See <URL:http://httpd.apache.org/userslist.html> for more info.
> To unsubscribe, e-mail: users-unsubscr...@httpd.apache.org
>    "   from the digest: users-digest-unsubscr...@httpd.apache.org
> For additional commands, e-mail: users-h...@httpd.apache.org
> 
> 


---------------------------------------------------------------------
The official User-To-User support forum of the Apache HTTP Server Project.
See <URL:http://httpd.apache.org/userslist.html> for more info.
To unsubscribe, e-mail: users-unsubscr...@httpd.apache.org
   "   from the digest: users-digest-unsubscr...@httpd.apache.org
For additional commands, e-mail: users-h...@httpd.apache.org

Reply via email to