The replies to my post came back saying that apache defaults to denying CONNECT requests which I was not able to verify. That mod_proxy was causing it. I have mod-proxy commented out. That the CONNECT request is some how being spoofed through php which I was not able to verify. My reading of php5 says it accepts all valid methods that apache hands it. To me this indicates that apache is not denying CONNECT requests by default. Reading a book I have titled 'Maximum Apache Security' it said to gain explicit control over the "Methods" use the <Limit> or <LimitExcept> declaratives with the 'Require valid-user' in the default <Directory /> definition in the http-conf file.
So in apache http-conf around line 340 I added the <LimitExcept GET POST> Declarative like this to the default directory definition so it looks like this. <Directory /> Options FollowSymLinks AllowOverride None Order allow,deny Allow from all <LimitExcept GET POST> Require valid-user </LimitExcept> </Directory> Now the access log shows this 188.8.131.52 - - [17/Jun/2007:22:42:49 -0400] "CONNECT 184.108.40.206:25 HTTP/1.0" 500 602 "-" "-" And the error.log shows this [Sun Jun 17 22:42:49 2007] [crit] [client 220.127.116.11] configuration error: couldn't perform authentication. AuthType not set!: / As you can see the CONNECT request is now being denied with a 500. The CONNECT requests have been stopped from attacking others. I post this solution so others can find it in the questions archives. _______________________________________________ firstname.lastname@example.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to "[EMAIL PROTECTED]"