Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 23 Jun 2002 10:01:18 +0200 (CEST)
From:      dirkx@covalent.net
To:        yid@softhome.net
Cc:        tlambert2@mindspring.com, root@utility.clubscholarship.com, freebsd-hackers@FreeBSD.org
Subject:   Re: inuring FreeBSD to the apache bug without upgrading apache ?
Message-ID:  <Pine.OSX.4.44.0206230957070.388-100000@mobile.webweaving.org>
In-Reply-To: <20020623003014.1575c491.yid@softhome.net>

next in thread | previous in thread | raw e-mail | index | archive | help

On Sun, 23 Jun 2002, Joshua Lee wrote:

> On Thu, 20 Jun 2002 19:59:20 -0700
> Terry Lambert <tlambert2@mindspring.com> wrote:
>
> > Patrick Thomas wrote:
> > > Is it possible to patch/recompile FreeBSD 4.5 in such a way that your
> > > system is no longer vulnerable to the "chunking" attack, even if you are
> > > still running a vulnerable apache ?
> >
> > Not FreeBSD, but it's possible to reconfigure Apache.
> >
> > The way you would deal with this would be to tell Apache that it
> > was an HTTP 1.0 server, since chunking is an HTTP 1.1 feature.
>
> I've found a better solution! On today's freshports there is something
> called mod_blowchunks :-) If installed, it will reject chunking and log
> it. This is an alternative to upgrading Apache.

Given the place the problem occurs: I'd be weary of such solutions.
Apaceh's myrad of config abilities are second only to sendmail - and it is
easy to let a certain case slip through.

If nessesary simply do a 'cvs diff' on apache it's cvs (dev.apache.org for
anon access; I am willing to work with BSD developers to help if needed)
to see the relatively few lines of code which are an issue - and which can
be backported easily.

Dw




To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.OSX.4.44.0206230957070.388-100000>