Hi..
Is Apache 1.3.x immune to viruses like Nimda and others like that by
default??
If not what shoul I do to make sure it is??
Thanks
Is Apache 1.3.x immune to viruses like Nimda and others like that by
default??
If not what shoul I do to make sure it is??
Thanks
--
Joshua Slive
Apache HTTP Server Users Mailing List: http://httpd.apache.org/userslist.html
> > Is Apache 1.3.x immune to viruses like Nimda and others like that by
> > default??
> Yes. (Assuming a sufficiently restrictive interpretation of "others
> like that".)
> --
> Joshua Slive
> Apache HTTP Server Users Mailing List:
I would answer these questions more seriously if they showed some sign
of being researched before hand.
--
Joshua Slive
Apache HTTP Server Users Mailing List: http://httpd.apache.org/userslist.html
There are so many different opinions on what constitutes a secure setup and
it all written by complete "propeller heads" and mostly totally out of date
so the normal IT person has got no chance of getting anywhere..
Then I turn to newsgroups for help but if you write the questions in a way
that makes it sound like you have ANY clue then no-one answers you because
the figure that you probably know more than they do..so I figure put in a
simple one line question hoping that someone will offer up some form of
useful information..
Alas this is not the case...
Thanks anyway..
> The "I wrote a stupid CGI program that gives remote access" virus.
> I would answer these questions more seriously if they showed some sign
> of being researched before hand.
> --
> Joshua Slive
> Apache HTTP Server Users Mailing List:
The answer to your question is that "no apache is not vulnerable toQuote:> Then I turn to newsgroups for help but if you write the questions in a way
> that makes it sound like you have ANY clue then no-one answers you because
> the figure that you probably know more than they do..so I figure put in a
> simple one line question hoping that someone will offer up some form of
> useful information..
> Alas this is not the case...
--
Joshua Slive
Apache HTTP Server Users Mailing List: http://www.veryComputer.com/
It least its somthing I don't have to worry about for now..
> > There are so many different opinions on what constitutes a secure setup
and
> > it all written by complete "propeller heads" and mostly totally out of
date
> > so the normal IT person has got no chance of getting anywhere..
> Well, I think that tells you one fact for sure: running a secure site
> is not easy.
> > Then I turn to newsgroups for help but if you write the questions in a
way
> > that makes it sound like you have ANY clue then no-one answers you
because
> > the figure that you probably know more than they do..so I figure put in
a
> > simple one line question hoping that someone will offer up some form of
> > useful information..
> > Alas this is not the case...
> The answer to your question is that "no apache is not vulnerable to
> any of the worms that have been circulating lately". But, of course,
> nobody who knows what they are doing is going to tell you that apache
> is not vulnerable to any worms/viruses. There is just no way to know
> what may be discovered tommorow.
> --
> Joshua Slive
> Apache HTTP Server Users Mailing List:
This is one of the reasons that Microsoft has such an abysmal record in
this area: "security" and "convenience" are opposite ends of a single
spectrum. M$ wants to make things "convenient" (read: easy) for their
customers. As a result, they ship easy-to-use, almost totally insecure
products.
If you want to make security "easier" (although not quite "simple"), here
are some time proven rules to keep in mind:
1. "That which is not explicitly permitted is prohibited". In other
words, start by turning off every feature, bell, whistle, etc. that
comes with a piece of software (*any* software -- even Apache).
This is especially true for any recently installed OS distros! Start
by editing /etc/inetd.conf and commenting out every damn service
that you can't *prove* you need. If you aren't running a particular
server, you needn't worry about staying on top of the security updates.
2. Enable only those features that you know you will need *and* that
you understand well enough to appreciate any security exposure.
3. Make sure you are on the updates mailing list for any server that you
are running: today's secure server is tomorrow's open gateway for
crackers.
4. With HTTP servers in particular, understand that any server-side
programming (i.e. any servable page that wasn't purely static) is
a potential security hole. Read and understand how permissions
flow from the server to a user written piece of code. Learn to ask
* what-if type questions. It has been shown over (and over and over)
that this is exactly what crackers do: they ask "what if I stick a
funny number/character in here, and then I pull this lever and
then I stuff a bomb in here? Can I blow the server up?" Sooner or
later the answer is *always* "Yes". If you are on the mailing list(s),
you will learn sooner, rather than later, about patches to close the
latest holes.
Cheers!
Peter Rowell
Datahedron Software
peter <who is at> datahedron <dot> com
If this project were to be any more open, bits would fall out.
-- bert hubert
You missed the most important one:Quote:> Not to defend the "propeller heads" too much (being fairly certain I am
> amongst their number), but security only comes in two flavors:
> 1. weak/non-existant
> 2. complex, on-going process of track, patch, reconfigure, etc.
They can be. But that doesn't excuse getting the worst of both worlds.Quote:> This is one of the reasons that Microsoft has such an abysmal record in
> this area: "security" and "convenience" are opposite ends of a single
> spectrum.
Any *X permits far, far more than Windoze. So why isn't it correspondinglyQuote:> 1. "That which is not explicitly permitted is prohibited".
--Quote:> (sound advice snipped)
Available for contract work - Programming, Unix, Networking, Markup, etc.
[...]
: If you want to make security "easier" (although not quite "simple"), here
: are some time proven rules to keep in mind:
: 1. "That which is not explicitly permitted is prohibited". In other
: words, start by turning off every feature, bell, whistle, etc. that
: comes with a piece of software (*any* software -- even Apache).
: This is especially true for any recently installed OS distros! Start
: by editing /etc/inetd.conf and commenting out every damn service
: that you can't *prove* you need. If you aren't running a particular
: server, you needn't worry about staying on top of the security updates.
While this is good advice, I do not believe you are going far enough.
It isn't enough to simply disable certain services, you shouldn't even
install them in the first place if you aren't going to be using them.
Services can't very well be exploited or accidentally started up if
they don't even exist.
[...]
Another very important concept that you left out is that security is
*always* relative and is acheivable only in depth. *Never* rely on
only one layer.
fpsm
--
| Fredrich P. Maney my_last_name AT my_last_name DOT org |
| Do NOT send me HTML formatted E-mail or copies of netnews posts! |
| Address in header is a spamtrap. Use one in signature for replies. |
| Please review http://www.maney.org/fred/site/uce/ before emailing. |
> > This is one of the reasons that Microsoft has such an abysmal record in
> > this area: "security" and "convenience" are opposite ends of a single
> > spectrum.
> They can be. But that doesn't excuse getting the worst of both worlds.
> > 1. "That which is not explicitly permitted is prohibited".
> Any *X permits far, far more than Windoze. So why isn't it correspondingly
> more vulnerable?
--
Rich Teer
President,
Rite Online Inc.
Voice: +1 (250) 979-1638
URL: http://www.rite-online.net
1. A handler for the Nimda virus - download location, etc.
Hey all. There was a little interest in obtaining the Apache::Nimda
module I have been working on, so here it is.
You can download Apache::Nimda from here:
http://acadia.ne.mediaone.net/Nimda/
If you already have Apache::CodeRed installed, this should install
without a hitch.
I haven't yet submitted this for distribution from CPAN, but over the
next few days I will investigate that possibility.
Hope this helps reduce the Nimda spread and maybe even hasten its
demise.
Lou
--
To e-mail me for *legitimate* purposes, change 'nospam' to 'ne',
otherwise post replies to the NG! If I need help here, I should darn
well be willing to come back for it, right?
It's not an optical illusion, it just looks like one.
-- Phil White
2. boot problem
3. CDE vs. /etc/passwd, /etc/shadow and /etc/group
4. Q: WLAN support in RH 2.4.18-24 vs. Stock 2.4.20 kernel ?
5. ssh chrooted enviroment WITHOUT /bin /etc /lib - etc etc in the users dir ?
6. Recent removal of SCSI drive...now what?
7. 3.5 MO, zip, etc, etc, etc.
8. Tcsh and TERMCAP not getting along
9. ps/1, Lilo, etc etc etc problems w/ instalation
10. Looking for sample /etc/named.conf and etc/resolv.conf and /etc/hosts
11. LINUX, 3COM ImpactIQ, ISDN, etc, etc, etc...
12. Apache::codered/nimda help
13. Nimda Question