View previous topic :: View next topic |
Author |
Message |
rodericj Tux's lil' helper
Joined: 08 Mar 2004 Posts: 97 Location: Rockville, MD
|
Posted: Fri Dec 10, 2004 8:54 pm Post subject: Very ODD Apache access log |
|
|
Hey check this out.
http://www.cs.rit.edu/~rmc8917/apacheoutput.txt
This is the 'tail -n 30' of my apache access log. There is some really strange stuff going on there. I moved my old access file to something like access_log.old and created a new one. Since then, I have been having some very odd outputs.
The output is so odd that when I copy pasted it into this box, it crashed windows in a way I have never seen it. (Yeah that makes you want to view the file). Its like all of those searches with the \'s in em messed something up.
Another thing that throws me off. Take a look at the IP addresses. It seems that there is a 192.168.1.109. I do no think that I do not have a 109 in my network.
Anybody know what I am seeing here?
p.s. I have since stopped my apache process for fear of some hacking. |
|
Back to top |
|
|
neilhwatson l33t
Joined: 06 Feb 2003 Posts: 719 Location: Canada
|
Posted: Fri Dec 10, 2004 9:03 pm Post subject: |
|
|
Those are Windows worms (e.g. Nimda). Use http://www.symantec.com/avcenter/ to search for some of those strings. _________________ The true guru is a teacher.
Neil Watson |
|
Back to top |
|
|
hanj Veteran
Joined: 19 Aug 2003 Posts: 1500
|
Posted: Fri Dec 10, 2004 9:05 pm Post subject: |
|
|
Those are standard windows script exploits... cmd.exe, etc. The SEARCH stuff is for IIS WebDav exploit. I think you're in the clear.
Hope this helps
hanji |
|
Back to top |
|
|
rodericj Tux's lil' helper
Joined: 08 Mar 2004 Posts: 97 Location: Rockville, MD
|
Posted: Fri Dec 10, 2004 9:29 pm Post subject: |
|
|
I am alright as in I am immune because cmd.exe is nothing on gentoo? Or I am alright as in these are more or less harmless?
I just don't want them craping up my log files. |
|
Back to top |
|
|
hanj Veteran
Joined: 19 Aug 2003 Posts: 1500
|
Posted: Fri Dec 10, 2004 9:37 pm Post subject: |
|
|
You are alright.. in the sense that these exploit attempts will not harm your gentoo box. IIS and Windows only.
These will 'crap' up your log files. If it is a consistent IP, you can try dropping traffic from the source via iptables, etc. Also are you rotating your apache logs via logrotate?
hanji |
|
Back to top |
|
|
rodericj Tux's lil' helper
Joined: 08 Mar 2004 Posts: 97 Location: Rockville, MD
|
Posted: Sat Dec 11, 2004 8:40 pm Post subject: |
|
|
Negative on the logrotate. I have never heard of it. I was just copying the file.
Bad idea?
I am emerging it now. It seems to just make it easier and more organized. Not so much that it will keep you from blowing up. |
|
Back to top |
|
|
hanj Veteran
Joined: 19 Aug 2003 Posts: 1500
|
Posted: Sat Dec 11, 2004 8:44 pm Post subject: |
|
|
Here is my sample apache script in /etc/logrotate.d/. It's nice cause it will rotate logs.. deleting the last one. You can set how often it rotates, and how much history you want to store before deleting, etc
Code: | /var/log/apache2/*log{
rotate 5
weekly
missingok
sharedscripts
postrotate
/etc/init.d/apache2 restart
endscript
} |
Make sure that logrotate is executable in /etc/cron.daily/logrotate. I think it is by default.
Hope this helps
hanji |
|
Back to top |
|
|
rodericj Tux's lil' helper
Joined: 08 Mar 2004 Posts: 97 Location: Rockville, MD
|
Posted: Sun Dec 12, 2004 4:45 pm Post subject: |
|
|
I would like it to not delete after rotates. How do I do that? I assume just take out the rotate 5.
I will wait for your response till I change anything.
Thanks though for the input. |
|
Back to top |
|
|
golloza Guru
Joined: 14 Mar 2004 Posts: 427
|
Posted: Sun Dec 12, 2004 4:48 pm Post subject: |
|
|
Code: | rotate count
Log files are rotated <count> times before being removed or mailed to the address specified in a mail directive. If count is 0,
old versions are removed rather then rotated.
|
man logrotate |
|
Back to top |
|
|
teknomage1 Veteran
Joined: 05 Aug 2003 Posts: 1239 Location: Los Angeles, CA
|
Posted: Mon Dec 13, 2004 1:20 am Post subject: |
|
|
You should also contact the owner of that block of IP addresses and inform them that their system(s) are infected. |
|
Back to top |
|
|
rex123 Apprentice
Joined: 21 Apr 2004 Posts: 272
|
Posted: Mon Dec 13, 2004 3:21 pm Post subject: |
|
|
teknomage1 wrote: | You should also contact the owner of that block of IP addresses and inform them that their system(s) are infected. |
Except that unfortunately nobody owns 192.168.1.109. It's in one of the reserved blocks [10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16].
I would say:
- do rotate your logs, unless you can be confident that nobody is interested in your server.
- do remove old ones or you run the risk of a full partition (theoretically; again, this might be amazingly unlikely)
- don't worry about feeble automated hack attempts. If you stop your server every time there's a strange line in the log, nobody will ever be able to see your site. If you have port 80 open to the world, you will get hits like that. |
|
Back to top |
|
|
neilhwatson l33t
Joined: 06 Feb 2003 Posts: 719 Location: Canada
|
Posted: Mon Dec 13, 2004 3:26 pm Post subject: |
|
|
You should be protecting yourself from spoof attacks. Interfaces pointed to the Internet should not accept connections from private IP ranges. _________________ The true guru is a teacher.
Neil Watson |
|
Back to top |
|
|
rodericj Tux's lil' helper
Joined: 08 Mar 2004 Posts: 97 Location: Rockville, MD
|
Posted: Mon Dec 13, 2004 7:06 pm Post subject: |
|
|
golloza wrote: | Code: | rotate count
Log files are rotated <count> times before being removed or mailed to the address specified in a mail directive. If count is 0,
old versions are removed rather then rotated.
|
man logrotate |
Yes. But I do not want to delete them. Thank you though. I suppose I will set it to a high number...Like 20 or something. (High for me).
[quote="neilhwatson"]
PostPosted: Mon Dec 13, 2004 10:26 am Post subject:
You should be protecting yourself from spoof attacks. Interfaces pointed to the Internet should not accept connections from private IP ranges.[/code]
Sometimes it is me from my desktop. So I want them. But I do not have the 109. That is not me.
Thanks for everyone's help. |
|
Back to top |
|
|
teknomage1 Veteran
Joined: 05 Aug 2003 Posts: 1239 Location: Los Angeles, CA
|
Posted: Tue Dec 14, 2004 3:22 am Post subject: |
|
|
A number of the worm attempts seemed to be coming from IP ranges owned by broadband providers, those were the ones I think should be reported. Since you have an address and a time presumably the ISP has a record of who that is and can inform them to fix it. |
|
Back to top |
|
|
Aurisor Guru
Joined: 20 Sep 2003 Posts: 361 Location: Boston MA
|
Posted: Tue Dec 14, 2004 6:44 am Post subject: |
|
|
Most of those worms open root holes on the infected machines...you could always take the liberty of disabling them yourself > |
|
Back to top |
|
|
|