Re: Stealthing a vhost

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



J Greenlees wrote:

>personally, I would consider a permanent redirect to 127.0.0.1 for all but your one excepted case on access of the default virtual host.
>their bots will screw their own server that way. ;)

Sorry to bring you the bad news, Jaqui, but bots don't respect redirection. I suspect they discard any response not bearing 200. I tried the 127.0.0.1 trick months ago to no effect, and have also tried redirection into private IP address space (eg 10.x.x.x). So I guess I'll just continue to suffer in (relative) silence. [If redirection did work on bots, I was going to find the most evil virus-ridden hellhole to send them to!]

Igor Cicimov wrote:

>Ok for the first problem, apache responding to the OPTIONS request...What about Limit and LimitExcept commands? Limiting the >OPTIONS to the local network or blocking them totally maybe?

I'm not too concerned about OPTIONS - it isn't used in any intrusion attempts, and IS used on my local network. I mentioned it just to point out that it's a server thing, not a vhost one.

Regards and thanks,
Peter

---------------------------------------------------------------------
The official User-To-User support forum of the Apache HTTP Server Project.
See <URL:http://httpd.apache.org/userslist.html> for more info.
To unsubscribe, e-mail: users-unsubscribe@xxxxxxxxxxxxxxxx
  "   from the digest: users-digest-unsubscribe@xxxxxxxxxxxxxxxx
For additional commands, e-mail: users-help@xxxxxxxxxxxxxxxx



[Index of Archives]     [Open SSH Users]     [Linux ACPI]     [Linux Kernel]     [Linux Laptop]     [Kernel Newbies]     [Security]     [Netfilter]     [Bugtraq]     [Squid]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Samba]     [Video 4 Linux]     [Device Mapper]

  Powered by Linux