On 3/5/2014 10:45, Tom Rivers wrote:
Now that I had successfully simulated the attack signature in the log file of the proxy web server, I logged into the target web server and looked at its access log. Thankfully I found no log of any activity from my XXX.XXX.XXX.XXX workstation IP. Not wanting to leave any stone unturned, I did a "tail -f" on the log file of the target web server and performed the same test again. I got the same results.
Sorry, it's a busy day at work and I wasn't as clear as I should have been in this last paragraph. What I should've said is that there were no entries in the log file of the target web server referencing the attempted "attack" for either the IP of my workstation or the IP of the proxy web server.
Sorry for the confusion. Tom -- users mailing list users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe or change subscription options: https://admin.fedoraproject.org/mailman/listinfo/users Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines Have a question? Ask away: http://ask.fedoraproject.org