Ravens PHP Scripts: Forums
 

 

View next topic
View previous topic
Post new topic   Reply to topic    Ravens PHP Scripts And Web Hosting Forum Index -> Security Issues
Author Message
djmaze
Subject Matter Expert



Joined: May 15, 2004
Posts: 727
Location: http://tinyurl.com/5z8dmv

PostPosted: Mon Jun 28, 2010 3:24 pm Reply with quote

Hi all,

today our apache went on his knees with 99.9% CPU

Investigation revealed a heavy attack to contact.php (anywhere) to compromise e107 based websites.

Although our Dragonfly CMS doesn't have such file, Apache couldn't handle all requests fast enough.

More info: [ Only registered users can see links on this board! Get registered or login! ]

_________________
$ mount /dev/spoon /eat/fun auto,overclock 0 1
ERROR: there is no spoon [ Only registered users can see links on this board! Get registered or login! ] 
View user's profile Send private message Visit poster's website
sixonetonoffun
Spouse Contemplates Divorce



Joined: Jan 02, 2003
Posts: 2496

PostPosted: Tue Jun 29, 2010 9:51 am Reply with quote

e107 fanboys went on the defensive. Not much to say on the topic but I know the server I'm hosted on hiccuped a little yesterday. Most likely the same sort of thing you experienced though my site wasn't the one getting clobbered with requests.

_________________
[b][size=5]openSUSE 11.4-x86 | Linux 2.6.37.1-1.2desktop i686 | KDE: 4.6.41>=4.7 | XFCE 4.8 | AMD Athlon(tm) XP 3000+ | MSI K7N2 Delta-L | 3GB Black Diamond DDR
| GeForce 6200@433Mhz 512MB | Xorg 1.9.3 | NVIDIA 270.30[/size:2b8 
View user's profile Send private message
gregexp
The Mouse Is Extension Of Arm



Joined: Feb 21, 2006
Posts: 1497
Location: In front of a screen....HELP! lol

PostPosted: Sat Jul 03, 2010 8:19 pm Reply with quote

Hi Dj,

If I could, I'd make a few suggestions:

1, change from apf to csf(much more concise and supported firewall rules).

2, add mod_security to your apache build(if not already there).

3, add mod_prefork, which will allow you to limit the number of children able to be generated per connection.

If you tweak mod_prefork correctly and have csf enabled, each ip will have to make a number of connections in order to get any form of result from any attack.

By that time csf will catch them automatically for too many connections and block them.

mod_security is just a good idea.

now, I personally tweak the hell out of csf, and force it to not only block the ip via iptables, I also tell it to route block them.

route add {ip} reject
When you do this, the server no longer responds to their request at all.

When just done through iptables, the server replies with a "I can't talk to you" packet, thus still creating a 2 way communication.

With route blocking, the sending computer will get absolutely no reply(as if the server was offline), and then it will not be able to open a communication with the server, and no longer send requests.

_________________
For those who stand shall NEVER fall and those who fall shall RISE once more!! 
View user's profile Send private message Send e-mail Visit poster's website AIM Address Yahoo Messenger MSN Messenger ICQ Number
djmaze







PostPosted: Wed Jul 07, 2010 12:19 am Reply with quote

Thanks gregexp, we will look into it!
 
Display posts from previous:       
Post new topic   Reply to topic    Ravens PHP Scripts And Web Hosting Forum Index -> Security Issues

View next topic
View previous topic
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You can attach files in this forum
You can download files in this forum


Powered by phpBB © 2001-2007 phpBB Group
All times are GMT - 6 Hours
 
Forums ©