Thank you for the useful info Sam, it seems to be WORKING!!
Probably, this is also a way to deny access to crawlers that don't respect robots.txt :)

On 23/6/2010 10:23 πμ, Samuele Kaplun wrote:
Hi Theodoros,

Il giorno mer, 23/06/2010 alle 07.48 +0200, Theodoros Theodoropoulos ha
scritto:
Lately we have several attempts from an agent named 'czxt2s' that
repeatedly tries to inject a certain SQL code into the url of our
invenio server. The injection is unsuccessful, but an exception is
produced every time. Where could i put some code to deny access to our
server from that specific agent?


The produced exception, follows: (the ip is different every time)
  >>>  Registered exception
2010-06-22 23:19:22 ->  ValueError: invalid literal for int(): 1' And
char(124)+(Select Cast(Count(1) as varchar(8000))+char(124) From
[sysobjects] Where 1=1)>0 and ''='

interesting attempt! :-)

I just came across yesterday to something might be useful for your case:

<http://httpd.apache.org/docs/2.2/mod/mod_authz_host.html>

At the bottom there is exactly an example on how to filter out, directly
in Apache, bots by matching them by User-Agent:

[...]
SetEnvIf User-Agent ^KnockKnock/2\.0 let_me_in
<Directory /docroot>
        Order Deny,Allow
        Deny from all
        Allow from env=let_me_in
</Directory>
[...]

On the other hand, to pro-actively defend your server from future
attacks you might give a look at mod_security:

<http://www.modsecurity.org/>

Cheers,
        Sam



Reply via email to