> > Does anyone else get entries like this in their apache2 access_log:
> >
> > 127.0.0.1 - - [26/Sep/2007:03:10:08 -0700] "GET /" 400 470
> >
> > I get a whole slew of them every day.  They always show up in batches
> > and each entry in a batch is logged at almost the same second.
> That make sense, since 400 means 'bad request' the culprit probably
> fails a preset number of times and then gives up.  Perhaps 127.0.0.1 is
> the setting for something in the absence of a sane configuration - in
> other words, it might be tricky to track this one down.  You'll have to
> let us know what gurific sleuthing techniques you employ to track down
> the bad guys.

What do you mean by "bad guys"?

I made a mistake in my initial post.  The 127.0.0.1 entries always
show up in ssl_access_log, not access_log.

Also, I noticed that a huge block of them always appears at the very
beginning of each day's ssl_access_log at exactly 3:10AM.

> You should perhaps use combined logging so you get more information,
> like the user agent and such.  right now you're using 'common' logging
> which has the additional disadvantage that it doesn't give you
> particularly useful information if you decide to use a statistical
> analyzer like awstats on your archive of logs from the past umpteen
> years.  The user agent might be useful for debugging purposes.

I switched ssl_access_log temporarily to the combined format, and it
was definitely working, but the 127.0.0.1 error looked exactly as it
did in common format with no extra information.

> You might also consider running tcpdump for a few hours or so, or
> something, and have it watch for that port and interface and run ps or
> something if you get output from it.   Or use iptables logging for the
> job, if you'd rather do that.

Any specific commands or even just certain parameters I should look into?

- Grant
-- 
[EMAIL PROTECTED] mailing list

Reply via email to