FYI...

I found a scumbag using my web server to hide behind while [s]he accessed
other servers.

Mandrake:  your server is also configured to allow these passthrough
requests!

To test your server, issue these comamds:

    telnet <server> 80
    GET http://<some_other_server> HTTP/1.0

If you get the output from <some_other_server>, <server> is allowing
passthrough (proxy) connections.

HTH,
Pierre

Begin forwarded message:

Date: Sun, 10 Mar 2002 12:26:17 -0800
From: Ian Holsman <[EMAIL PROTECTED]>
To: "'[EMAIL PROTECTED]'" <[EMAIL PROTECTED]>, "'[EMAIL PROTECTED]'"
<[EMAIL PROTECTED]> Subject: RE: 1.3.x allows passthrough


 
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi Pierre
try disabling your proxy

look for a line like
LoadModule proxy_module modules/....
and comment it out by placing a '#' in front of it

also 
turn 'ProxyRequests' to OFF
(this is around line 988 on my config file)



> -----Original Message-----
> From: Pierre Fortin [mailto:[EMAIL PROTECTED]]
> Sent: Sunday, March 10, 2002 7:55 AM
> To: [EMAIL PROTECTED]
> Subject: 1.3.x allows passthrough
> 
> 
> [Also reported to CERT since they have the same exposure; see
> below]  
> 
> I was monitoring my DSL link when I noticed some strange HTTP 
> requests to
> my web site...  someone was using my server to hide behind by 
> formatting
> requests like this:
> 
>    GET http://somesite.domain/page HTTP/1.0
> 
> which caused my 1.3.20 to acquire and serve the requested 
> remote page.  To
> see if I was alone, I tried this on www.apache.org (2.0.32) 
> which rejects
> this type of request, though I'm not sure if it is by design.
> 
> I also tried such a query to www.cert.org and it *did* serve 
> up a remote
> page.
> 
> Hopefully there is at least a workaround...
> 
> Pierre Fortin


Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com

Reply via email to