One way is to use some sort of packet scrubbing method.

either iptables on the webserver or firewall and queue all web traffic
to snort-iptables (http://w3.cablespeed.com/~rvmcmil/).

or hogwash http://hogwash.sourceforge.net/

Both of these methods use snort based rules so you can easily update it
to filter new web attacks when they appear.

If you use snort-iptables you should compile with the
"--enable-flexresp" and add "resp: rst_rcv;" to the rules so that
sessions that are filter are closed properly with your webserver.

On Mon, 2002-01-28 at 09:49, Brian Clifton wrote:
> Dear All 
> 
> Is there a way to stop apache responding to .exe file requests altogether?
> 
> I am getting fed up with my error_log file being filled by nimbda and we don't host 
>any .exe files!! I have been monitoring 
> it since the summer and the number of nimbda type entries appears to have started to 
>go up again since xmas...
> 
> Any thoughts greatly appreciated... 
> 
> Thanks in advance, Brian 


Reply via email to