Semi Off Topic
My searching hasn't found what I consider superior info, and we are wondering from others experience on this list...
In the logwatch results we all see the info below on almost a daily basis
I have taken the liberty of combining logwatch results from centos 4 and 5 machines for extra info and future searchability
----- Centos 4 -----
--------------------- httpd Begin ------------------------
GET http://scifi.pages.at/myproxies/azenv.php HTTP/1.1 with response code(s) 404 1 responses
GET http://thecric.free.fr/AZenv/azenv.php HTTP/1.1 with response code(s) 404 1 responses
----- Centos 5 -----
--------------------- httpd Begin ------------------------
Requests with error response codes
http://scifi.pages.at/myproxies/azenv.php: 2 Time(s) http://thecric.free.fr/AZenv/azenv.php: 2 Time(s)
GET http://scifi.pages.at/myproxies/azenv.php HTTP/1.1 with response code(s) 404 3 responses
GET http://thecric.free.fr/AZenv/azenv.php: 2 Time(s) HTTP/1.1 with response code(s) 404 3 responses
Is it like people are setting up servers to do advertising in our logs while looking for some vulnerabilities?
Thanks in advance for your insight... :-)
- rh
On Fri, Jul 18, 2008 at 1:13 PM, Robert - elists lists07@abbacomm.net wrote:
Semi Off Topic
My searching hasn't found what I consider superior info, and we are wondering from others experience on this list...
In the logwatch results we all see the info below on almost a daily basis
I have taken the liberty of combining logwatch results from centos 4 and 5 machines for extra info and future searchability
Centos 4
--------------------- httpd Begin ------------------------
GET http://scifi.pages.at/myproxies/azenv.php HTTP/1.1 with response code(s) 404 1 responses
This means someone is trying to use your web server as an open proxy. The good news is that you have it configured the right way and you give a 404 response (page does not exist).
Robert - elists wrote:
GET http://scifi.pages.at/myproxies/azenv.php HTTP/1.1 with response code(s) 404 1 responses
I installed fail2ban from rpmforge and created a filter that bans these type of things.
Here is my novice attempt at the failregex = <HOST> - - [.*] "GET .*(azenv.php|adxmlrpc.php|xmlrpc.php).*"