Mod_evasive Bans Some Legit Apps

Dec 10, 2007

mod_evasive bans some of the legit users (galleries , typo3 etc.) with following settings:

<IfModule mod_dosevasive20.c>
DOSHashTableSize 3097
DOSPageCount 10
DOSSiteCount 150
DOSPageInterval 1
DOSSiteInterval 3
DOSBlockingPeriod 10
</IfModule>

Somebody have an idea for some less restrictive but still usefull rules?

View 10 Replies


ADVERTISEMENT

How To Set Up Honeypot IP Bans

Jul 24, 2009

I see stuff like this in my logs all the time:

[Mon Jun 29 16:07:25 2009] [error] [client 174.36.229.37] File does not exist: C:/wamp/www/mifbody/phpMyAdmin-2.6.2-beta1
[Mon Jun 29 16:07:25 2009] [error] [client 174.36.229.37] File does not exist: C:/wamp/www/mifbody/phpMyAdmin-2.6.2-rc1 ....

View 2 Replies View Related

Webhostmagazine.com Reviews - Legit

Jan 14, 2008

webhostmagazine.com have their own hosting reviews, does anyone have any experience or opinions with reards to the reliability or integrity of these reviews?

Im not one to take such things at face value.

View 4 Replies View Related

Is Hyperspin Rankings Legit

Jul 26, 2008

[url]

is this a trustworthy and accurate resource?

View 12 Replies View Related

APF Blocking Legit Users

Aug 21, 2007

This is just a notice: one of the staff of a large site I run was no longer able to log into the site. As it turns out his IP was being blocked by APF.

The reason for his IP being blocked was that it ended in 255 (x.x.x.255). Any such addresses are blocked by the PKT_SANITY_STUFFED option, which is turned on by default in recent versions of APF. When restarting APF this option shows up as {pkt_sanity} deny all to/from 0.0.0.255/0.0.0.255 and can be seen under "OUT_SANITY" when doing "apf --list".

As you notice the problem is that some ISPs are are assigning supposedly "bad" IPs ending in 255 to users. And I'm not the only one hitting this problem either: [url]

If you are also using (a recent version of) APF, you might want to turn this option OFF.

In the meanwhile, if anyone is so enlighted... why was this option in APF in the first place? What so bad about IPs ending on 255? The APF docs say they're bad broadcast addresses, so why are ISP assigning them anyway? Who is at fault: APF or ISPs?

View 3 Replies View Related

Legit Backup Script

Jan 10, 2007

I got this from 1and1 and have no confidence in them. I want to be sure my site is backed up (I will be using bq and whoever the new host is to back it up also) I have done these commands and it "backs up" and then I FTP the backup to my computer but I want to be sure there is actually information in that backup. Does this sound legit?

Open Putty
login
at command, type

mysqldump --opt -Q -h localhost -databaseusername -p databasename >sitename.backup.sql
hit enter
it goes to next line and is done
then FTP to my computer and I have a backup.

So first, does it sound legit? Second, what do I DO with it should my site go down. Do I just FTP it back to the server?

View 9 Replies View Related

Lfd Warning: Hack Attempt Or Legit

May 18, 2009

Code:

Mon May 18 15:17:08 2009 lfd: *Suspicious File* /tmp/perl_install.work.TLoX0YtaJBrzShwA/.cpan [someuser:someuser
] - Suspicious directory
The 'someuser' is a legitimate user on the server, an auto body website setup last October.

The content of the directory:

Quote:

root@server [/tmp/perl_install.work.TLoX0YtaJBrzShwA/.cpan/CPAN]# ls -lh
total 3.0K
drwx------ 2 someuser someuser 1.0K May 16 17:54 ./
drwx------ 3 someuser someuser 1.0K May 16 17:54 ../
-rw-r--r-- 1 someuser someuser 361 May 16 17:54 MyConfig.pm

File content:

Code:
$CPAN::Config->{'cpan_home'} = "/tmp/perl_install.work.TLoX0YtaJBrzShwA/.cpan";
$CPAN::Config->{'build_dir'} = "/tmp/perl_install.work.TLoX0YtaJBrzShwA/.cpan/build";
$CPAN::Config->{'histfile'} = "/tmp/perl_install.work.TLoX0YtaJBrzShwA/.cpan/histfile";
$CPAN::Config->{'keep_source_where'} = "/tmp/perl_install.work.TLoX0YtaJBrzShwA/.cpan/sources";
1;
__END__

Code:
root@server [/tmp/perl_install.work.TLoX0YtaJBrzShwA/.cpcpan/STABLE]# ls -lh
total 3.0K
drwx------ 2 someuser someuser 1.0K May 16 17:54 ./
drwx------ 3 someuser someuser 1.0K May 16 17:54 ../
-rw-r--r-- 1 someuser someuser 735 May 16 17:54 modules.versions

View 0 Replies View Related

HostJury Deleted Legit Reviews

Dec 15, 2008

I wanted to post about a site I'm very concerned and frustrated with, HostJury.

It's simple. The other day, one of our web hosting customers posted our HostJury URL in our customer forums. Since then, a few of our customers saw followed the link and decided to submit reviews about us, which was very pleasing.

Friday night, I saw we had our first 4 reviews. Suddenly yesterday (Saturday) afternoon I checked on the page, and saw all of them had been deleted.

But I looked up the reviewers. They were all posted by legit customers of ours which I was able to find in our customer database, so the reviews are definitely legit.

I am especially frustrated as those 4 had rated us very high, so these are important reviews that have been removed by HostJury.

I don't understand what's going on here...

o Legit reviews
o We didn't ask them to review us, they did it on their own
o We didn't bribe our reviewers
o We didn't reward our reviewers

So what's the problem, HostJury? These kind of instances are interfering with honesty in the hosting industry.

View 10 Replies View Related

Allowing Legit Traffic Permanently (CSF Iptables)

Oct 29, 2007

My server runs on CSF.

Very often the firewall automatically ban some of my customers IP who has fix IP to access to their webmail and website, because they have over 100 staffs, maybe that is why the IP was banned automatically for having too many connections to the server.

Everytime I unban the IP, it keeps being banned again. I have to stop / restart iptables to flush it.

How can I allow the IP permanently?

View 1 Replies View Related

Apache :: Seemingly Legit Requests Generating 400 Bad Request Errors

Feb 8, 2015

So I've got a problem where a small percentage of incoming requests are resulting in "400 bad request" errors and I could really use some input. At first I thought they were just caused by malicious spiders, scrapers, etc. but they seem to be legitimate requests.

I'm running Apache 2.2.15 and mod_perl2.

The first thing I did was turn on mod_logio and interestingly enough, for every request where this happens the request headers are between 8000-9000 bytes, whereas with most requests it's under 1000. Hmm.

There are a lot of cookies being set, and it's happening across all browsers and operating systems, so I assumed it had to be related to bad or "corrupted" cookies somehow - but it's not.

I added "%{Cookie}i" to my LogFormat directive hoping that would provide some clues, but as it turns out half the time the 400 error is returned the client doesn't even have a cookie. Darn.

Next I fired up mod_log_forensic hoping to be able to see ALL the request headers, but as luck would have it nothing is logged when it happens. I guess Apache is returning the 400 error before the forensic module gets to do its logging?

By the way, when this happens I see this in the error log:

request failed: error reading the headers

To me this says Apache doesn't like something about the raw incoming request, rather than a problem with our rewriting, etc. Or am I misunderstanding the error?

I'm at a loss where to go from here. Is there some other way that I can easily see all the request headers? I feel like that's the only thing that will possibly provide a clue as to what's going on.

View 1 Replies View Related

Mod_evasive

Jun 21, 2007

I know this can be the most foolishly question on WHT but I'm looking for mod_evasive's download link, I tried googling and searching all forums but all links was dead

anybody can give me a link to get mod_evasive ? Ofcourse If you have a better idea than using of mod_evasive I'll be glad to hear

View 2 Replies View Related

Mod_evasive

Oct 14, 2007

We installed mod_evasive and ever since we are getting files like: dos-xxx.xxx.xxx.xxx, where xxx.xxx.xxx.xxx is an IP in our /tmp directory. The contents of the file is usually a 4 or 5 digit number and is owned by apache. Can anyone help me understand what this file is? Is it a product of mod_evasive? Can the files be deleted?

View 14 Replies View Related

Mod_evasive Log Content

Mar 24, 2008

I have a file named dos-1.2.13.4 (i changed the IP address in purpose) inside the log and inside the file there is a 4 digit number that is constantly changing. more

[root@myserver]# more dos-1.2.13.4
8726

What is 8726?

View 1 Replies View Related

Mod_evasive Installation

Feb 25, 2008

We are having problem with installing mod_evasive on our server. We tried installing it on our Virtual Machine that runs Fedora 7 (on our server, we have Fedora core 5), and on Virtual Machine it is fine, we can compile it and put it in our Apache2 conf file.

However, when we try

[root@ mod_evasive]# /usr/local/psa/admin/bin/apxs -i -a -c mod_evasive20.c
on the server, we get a

[root@ mod_evasive]# /usr/local/psa/admin/bin/apxs -i -a -c mod_evasive20.c
gcc -DHARD_SERVER_LIMIT=512 -DDEFAULT_PATH="/usr/local/psa/admin/bin:/bin:/usr/bin" -DLINUX=22 -DTARGET="httpsd" -DHAVE_SET_DUMPABLE -DNO_DBM_REWRITEMAP -DMOD_SSL=208122 -DEAPI -O -pipe -I/usr/include -O3 -fexpensive-optimizations -fstrength-reduce -pipe -DPLESK_Linux -I/home/builder/buildbot/psa-8.2.1-bfc7/build/plesk/lib/dist/include/libxml2 -W -Wall -DPLESK_Linux -I/home/builder/buildbot/psa-8.2.1-bfc7/build/plesk/plesk-utils/include -DBSG_CR -DBSG_MSG -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -DHAS_RPM -DUSE_SLEEP_ON_IDLE -Wno-unused-parameter -fpic -DSHARED_MODULE -I/usr/local/psa/admin/include -c mod_evasive20.c ....

View 1 Replies View Related

Testing Mod_Evasive

Apr 2, 2007

I have 2 questions here.

1. I have installed mod_evasive version 1.10.1 on a Cent OS 4.4 server.

I'm using the test.pl script that comes with mod_evasive to test the configuration and when running the script from the same server mod_Evasive is installed. The mod_evasive is able to detect the intrusion and block the IP of the server.

If I use the same test.pl script from an external server the requests come in and are viewable in the access log but mod_evasive doesnt block the IP of the external server. Probably is not blocing the ip of the external server because of latency.

Is there a way to modify the test.pl script to make it more agressive and get results when testing from an external server?

Here I'm pasting the code of the test.pl script:

Code:
#!/usr/bin/perl

# test.pl: small script to test mod_dosevasive's effectiveness

use IO::Socket;
use strict;

for(0..100) {
my($response);
my($SOCKET) = new IO::Socket::INET( Proto => "tcp",
PeerAddr=> "test.domain.tld:80");
if (! defined $SOCKET) { die $!; }
print $SOCKET "GET /?$_ HTTP/1.0

";
$response = <$SOCKET>;
print $response;
close($SOCKET);
}

2. Also, I have sendmail installed and on the mod_evasive config I have email address specified on DOSEmailNotify. When testing from the internal server with the test.pl script the server is able to block the ip, put in the hash table but it never sends an email to my email address.

View 0 Replies View Related

Mod_evasive Settings

Mar 30, 2007

mod_evasive settings?

I cant find out the setting which would ban all bad IPs and will nto ban normal ones.

View 0 Replies View Related

Mod_Evasive Rules

Apr 1, 2007

Does anyone know any good mod_evasive rules that pick up DoS, but not many false positives? Just looking to see what works for everyone out there, been having trouble.

Or if there is better apache module to combat DoS.

View 3 Replies View Related

Error On Install Mod_evasive

Mar 25, 2009

i want to install mod on my centos Cpanel server. so i try:

cd /usr/local/src
wget mod_evasive_1.10.1.tar.gz
tar -zxf mod_evasive_1.10.1.tar.gz
cd mod_evasive
/usr/sbin/apxs -cia mod_evasive20.c

but when i run /usr/sbin/apxs -cia mod_evasive20.c there is some error for me :

[root@ mod_evasive]#/usr/sbin/apxs -cia mod_evasive20.c
-bash: /usr/sbin/apxs: No such file or directory

View 8 Replies View Related

Mod_evasive Is It Good To Install

Nov 27, 2008

and is it good to install or not?[url]

View 5 Replies View Related

Mod_Evasive - Testing Remotely

Apr 10, 2007

I have 2 questions here.

1. I have installed mod_evasive version 1.10.1 on a Cent OS 4.4 server.

I'm using the test.pl script that comes with mod_evasive to test the configuration and when running the script from the same server mod_Evasive is installed. The mod_evasive is able to detect the intrusion and block the IP of the server.

If I use the same test.pl script from an external server the requests come in and are viewable in the access log but mod_evasive doesnt block the IP of the external server.

Probably is not blocing the ip of the external server because of latency.

Is there a way to modify the test.pl script to make it more agressive and get results when testing from an external server?

Here I'm pasting the code of the test.pl script:

Quote:

#!/usr/bin/perl

# test.pl: small script to test mod_dosevasive's effectiveness

use IO:ocket;
use strict;

for(0..100) {
my($response);
my($SOCKET) = new IO:ocket::INET( Proto => "tcp",
PeerAddr=> "test.domain.tld:80");
if (! defined $SOCKET) { die $!; }
print $SOCKET "GET /?$_ HTTP/1.0

";
$response = <$SOCKET>;
print $response;
close($SOCKET);
}

2. Also, I have sendmail installed and on the mod_evasive config I have email address specified on DOSEmailNotify. When testing from the internal server with the test.pl script the server is able to block the ip, put in the hash table but it never sends an email to my email address.

View 0 Replies View Related

Can I Turn Off Mod_evasive In .htaccess

Jul 30, 2007

Can I turn off mod_evasive in .htaccess or does it have to be done server wide only in httpd.conf?

Or if not, is there a way I can exclude a specific account from it?

View 1 Replies View Related

Mod_Evasive Enhancing Reporting

Apr 27, 2007

I got mod_evasive installed and its working fine. Its detecting the IPs, blocking the IPs and sending me the emails.

The emails I'm getting only have the sender name "Apache" and the content shows the IP address is blocking.

How can I enhance the email report to display the following:

1) get a proper Subject header in the email

2) change the From header to include the hostname - i.e.
apache@web.domain.tld

3) have the program do a reverse lookup on the ip, and include that in the body.

Do I need to include a script using the DOSSystemCommand to do this?

View 5 Replies View Related

Mod_Evasive - Testing Remotely

Apr 11, 2007

I have 2 questions here.

1. I have installed mod_evasive version 1.10.1 on a Cent OS 4.4 server.

I'm using the test.pl script that comes with mod_evasive to test the configuration and when running the script from the same server mod_Evasive is installed. The mod_evasive is able to detect the intrusion and block the IP of the server.

If I use the same test.pl script from an external server the requests come in and are viewable in the access log but mod_evasive doesnt block the IP of the external server. Probably is not blocing the ip of the external server because of latency.

Is there a way to modify the test.pl script to make it more agressive and get results when testing from an external server?

Here I'm pasting the code of the test.pl script:

Quote:

#!/usr/bin/perl

# test.pl: small script to test mod_dosevasive's effectiveness

use IO:Socket;
use strict;

for(0..100) {
my($response);
my($SOCKET) = new IO:Socket::INET( Proto => "tcp",
PeerAddr=> "test.domain.tld:80");
if (! defined $SOCKET) { die $!; }
print $SOCKET "GET /?$_ HTTP/1.0

";
$response = <$SOCKET>;
print $response;
close($SOCKET);
}

2. Also, I have sendmail installed and on the mod_evasive config I have email address specified on DOSEmailNotify. When testing from the internal server with the test.pl script the server is able to block the ip, put in the hash table but it never sends an email to my email address.

View 0 Replies View Related

Mod_Evasive - Blocking IPs Manually

Oct 26, 2007

Is there a way to block ips with mod_evasive by adding the ips to the mod_evasive configuration file?

View 3 Replies View Related

Mod_evasive And Black List

Jul 9, 2007

Some times I read in logs
server mod_evasive[24203]: Blacklisting address 84.255.151.xxx: possible attack.

Where can I find this black list and all IP listed

View 2 Replies View Related

Errror When Restarting Httpd Mod_evasive

May 5, 2008

Installing mod_evasive after serveral attacks on our server.

but when restarting httpd I get this error,

httpd: Syntax error on line 36 of /usr/local/apache/conf/httpd.conf: API module structure 'evasive20_module' in file /usr/lib/httpd/modules/mod_evasive20.so is garbled - expected signature 41503232 but saw 41503230 - perhaps this is not an Apache module DSO, or was compiled for a different Apache version?


Running apache 2.2.8

View 1 Replies View Related

Installing Mod_evasive On Cpanel Server

Jun 23, 2008

I would like to install the Mod_evasive for Apache 2.0 on RHEL 4 Server(Cpanel Installed). I downloaded the Mod_evasive source and extracted and used the following command.

# cd mod_evasive
# /usr/sbin/apxs -cia mod_evasive20.c

I am getting folowing message.

-bash: /usr/sbin/apxs: No such file or directory

# whereis apxs
apxs:

View 2 Replies View Related

Mod_evasive Doesn't Protect From Apache DOS

Feb 6, 2008

We tried to use one software for offline browsing to download our site and test it if it will fail or not. We used 500 threads at once. Program was able to request 56 pages per second. Of course server (site) failed because there were no more available mysql connections. So site went down. Mod_evasive didn't block that.

Here is the config:

<IfModule mod_evasive20.c>
DOSHashTableSize 3097
DOSPageCount 2
DOSSiteCount 80
DOSPageInterval 1
DOSSiteInterval 1
DOSBlockingPeriod 30
DOSLogDir "/var/log/httpd"
</IfModule>

Here is the copy of text I found on one site about mod_evasive:

Mod_evasive does work relatively well for small to medium sized brute force or HTTP level DoS attacks. There is, however, an important limitation that mod_evasive has that you should be aware of. The mod_evasive module is not as good as it could be because it does not use shared memory in Apache to keep information about previous requests persistent. Instead, the information is kept with each child process or thread. Other Apache children that are then spawned know nothing about abuse against one of them. When a child serves the maximum number of requests and dies, the DoS information goes with it. So, what does this mean? This means that if an attacker sends their HTTP DoS requests and they do not use HTTP Keep-Alives, then Apache will spawn a new child process for every request and it will never trigger the mod_evasive thresholds. This is not good…

Is there any solution for such type of attack with Keep Alive disabled?

View 4 Replies View Related

Mod_evasive Suggestion For High Traffic Server

Mar 12, 2008

The server gets around 25k unique visitors per day, but one website in particular allows hotlinking and uses a lot of bandwidth. Last time I checked...according to whm apache status page, I was getting 180 requests per second. Not sure what time it was though. So it might be higher at a different time of the day.

Recently got mod_evasive installed, but I didn't want it to block out legitimate users. Currently it's set to this...

<IfModule mod_evasive20.c>
DOSHashTableSize 3097
DOSPageCount 5
DOSSiteCount 100
DOSPageInterval 2
DOSSiteInterval 2
DOSBlockingPeriod 10
DOSBlockingPeriod 600
</IfModule>

what a better configuration would be? When I run the log I already see it block out a bunch of IP's. I don't want to lose any visitors to this program, but I do get ddos a lot.

View 1 Replies View Related

Lighttpd Mod_evasive Setting Up A Specific Conditional

Oct 24, 2007

I just started using lighttpd for download purpose.

I limited the number of connection per ip to 5 using mod_evasive .

When a user is downloading with a download manager the number of connection is reached to its maximum. I was wondering if there is a way to allow that same user to be able have 1 additional connection when an index.php is requested . That is, if the user is trying to view an index.php file it would ignore the rule evasive.max-conns-per-ip = 5 .

Each user have their download dir located on [url] in that same dir contains an index.php which contains login tab and integrated directory listing .

View 0 Replies View Related

How To Install Mod_security, Suhosin, Mod_Evasive On Server Plesk (apache2, Php5)

Jul 26, 2007

how to install mod_security, suhosin, Mod_Evasive on server plesk (apache2, php5)?
win I loacate apxs I have empty results

View 4 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved