> -----Original Message-----
> From: André Warnier [mailto:a...@ice-sa.com]
> Subject: Re: Access Log Valve invalid requests
> 
> Leo Donahue - PLANDEVX wrote:
> > Tomcat 6.0.35
> >
> > http://tomcat.apache.org/tomcat-6.0-
> doc/config/valve.html#Access_Log_V
> > alve
> >
> > "Some requests may be handled by Tomcat before they are passed to a
> container.  These include redirects from /foo to /foo/ and the
> rejection of invalid requests".
> >
> > What is an invalid request?  If I have a deny set for a Remote Host
> Filter, is that considered an invalid request attempt?
> >
> > What I'm trying to do is deny a certain requestor from making a POST
> request to a URL that is no longer published, yet retain the attempted
> request in the access log.  If I'm denying the request, should I even
> care to log the fact that there are still attempts at a non-existent
> webapp?
> >
> > The requestor makes about 200 POST requests within a few seconds
> everyday around the same time for the past 4 months.  They all result
> in HTTP 500.
> >
> Find him and shoot him.
> 
> Seriously, you should be able to log its IP address. From the IP
> address, you should be able to find the domain (WHOIS), 


I log the IP and it comes from a US ISP.  Email has been sent.


> and an email
> address for a domain admin or better someone responsible for spam and
> other nasties.  If it is not in China, send them an email indicating
> the problem, with an excerpt of your logs.
> In my experience, in most cases (80%), it works, in the sense that the
> attempts stop.  In 1% of cases, you might even get a polite thank you
> answer. (*) If it continues, then it is usually better to filter this
> before it even reaches Tomcat.
> A firewall or iptables (Linux) just blocking any connection from that
> IP will do fine, and will not force your www server to handle that load
> for nothing.
> 
> Most of these things are nasty hacking programs which continuously scan
> a range of IP addresses and try to break in using a range of well-known
> "weak" URLs.  Most of those are "trojan" programs that run on hosts
> that have been broken in, and are not themselves even suspecting that
> they have been broken in.
> It can also be a legitimate program which just has the wrong hostname
> or IP address to connect to.  It may be worth 5 minutes of your time to
> let such "normal people" know that something is amiss, rather than
> letting them continue to host a trojan or have a badly-configured
> application running.
> 
> (*) I would be curious to see the break-down of the other 79%.  They
> could be nice people who realise that one of their servers is doing
> something it shouldn't; or they could be nasty people knowing that
> their server is doing something it shouldn't, and stopping because
> they've been found out.  But there is no way to know for sure.

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to