On Wed, Jul 09, 2025 at 10:30:59PM -0600, latin...@resist.ca wrote:
> > Quoth latin...@resist.ca:
> >> Hello
> >>
> >> i found today these lines, is it something to be worry please?
> >>
> >> agroena.org 185.177.72.16 - - [09/Jul/2025:13:06:03 -0700] "GET
> >> /.well-known/security.txt HTTP/1.1" 404 0
> >> agroena.org 185.177.72.16 - - [09/Jul/2025:13:06:03 -0700] "GET
> >> /?file=../../../../../../etc/passwd HTTP/1.1" 200 7591
> >> agroena.org 185.177.72.16 - - [09/Jul/2025:13:06:04 -0700] "GET
> >> /?file=../../../../etc/passwd HTTP/1.1" 200 7591
> >> agroena.org 185.177.72.16 - - [09/Jul/2025:13:06:04 -0700] "GET
> >> /?inc=../../../../etc/passwd HTTP/1.1" 200 7591
> >> agroena.org 185.177.72.16 - - [09/Jul/2025:13:06:04 -0700] "GET
> >> /?include=../../../../etc/passwd HTTP/1.1" 200 7591
> >> agroena.org 185.177.72.16 - - [09/Jul/2025:13:06:04 -0700] "GET
> >> /?layout=../../../../etc/passwd HTTP/1.1" 200 7591
> >> agroena.org 185.177.72.16 - - [09/Jul/2025:13:06:05 -0700] "GET
> >> /?module=../../../../etc/passwd HTTP/1.1" 200 7591
> >> agroena.org 185.177.72.16 - - [09/Jul/2025:13:06:05 -0700] "GET
> >> /?page=../../../../etc/passwd HTTP/1.1" 200 7591
> >> agroena.org 185.177.72.16 - - [09/Jul/2025:13:06:05 -0700] "GET
> >> /?path=../../../../../../boot.ini HTTP/1.1" 200 7591
> >> agroena.org 185.177.72.16 - - [09/Jul/2025:13:06:05 -0700] "GET
> >> /?template=../../../../etc/passwd HTTP/1.1" 200 7591
> >> agroena.org 185.177.72.16 - - [09/Jul/2025:13:06:06 -0700] "GET
> >> /?view=../../../../etc/passwd HTTP/1.1" 200 7591
> >>
> >
> > Nope, just another bot trying to pry into your secrets.  you'll see
> > similar failed attempts to break into your system if you look in
> > /var/log/authlog (assuming you have ssh listening on port 22).  As
> > long as you have a secure setup and don't serve your passwords over
> > HTTP (as that's what the bot is trying to grab) you'll be fine.
> >
> > --
> > noodle
> >
> >
> Thank you noodle, i was cautious because of  the 200 which appears when
> someone access the web page.

The 200 return code just indicates that the server returned _something_
for the request.  I.E. the request was completed without error.

To help with future concerns:

If / points to a static page on your server, then the arguments following
the ? will be ignored and the server will just serve that page as normal.

But in any case, you have the file size that was served - 7591 bytes.  Is
that the normal size of your / page or the size of your /etc/passwd?

Since it returned the same length of 7591 for the request for boot.ini,
it's almost certainly just serving your normal / page.

Also, note that although /etc/passwd contains potentially useful information,
the real hashed passwords are stored in /etc/master.passwd.



Reply via email to