On Thu, 2003-01-23 at 13:46, Peter Kiem wrote:
> Hi Gordon,
> 
> > The status 200 may indicate that you're vulnerable to the problem
> > they're testing for.  What version of apache are you running?  On what
> > platform?  Have you enabled proxying?
> 
> That's what I am worried about.
> 
> Red Hat 7.3
> apache-1.3.27-1.7.2
> 
> No proxy enabled unless it is enabled by default. mod_proxy is not
> loaded and the ProxyRequests On is commented out as per the default
> install.

My server is the same platform, but with apache-1.3.27-2.  You appear to
have the errata version from 7.2 installed.

In any case, If I telnet to port 80 on my server and issue a CONNECT
command, I get a 405 error, "Method not allowed", but I'm probably not
replicating their exact method.

If you're getting the scans fairly often, try dumping traffic on port 80
to a file using "tcpdump -w logfile port 80".  Next time you see such a
request, stop logging and use ethereal to reconstruct the HTTP
conversation, and you'll see exactly what commands were sent, and what
you server did about them.



-- 
redhat-list mailing list
unsubscribe mailto:[EMAIL PROTECTED]?subject=unsubscribe
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to