Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 22 Jun 2002 16:57:36 -0600
From:      Brett Glass <brett@lariat.org>
To:        <jps@funeralexchange.com>, <kzaraska@student.uci.agh.edu.pl>
Cc:        <freebsd-security@FreeBSD.ORG>
Subject:   Re: Apache FreeBSD exploit released
Message-ID:  <4.3.2.7.2.20020622165052.02209380@localhost>
In-Reply-To: <3177.66.171.47.179.1024786088.squirrel@webmail.allneo.com>
References:  <20020622125713.547c2546.kzaraska@student.uci.agh.edu.pl> <20020622125713.547c2546.kzaraska@student.uci.agh.edu.pl>

next in thread | previous in thread | raw e-mail | index | archive | help
At 04:48 PM 6/22/2002, jps@funeralexchange.com wrote:

>Anyone know of any ports or tools i could use on my servers to watch out
>for something like this?

You can probably use some of the ideas I presented at the January BSDCon.
Either the Apache SetEnvIf regexes or the SNOBOL log monitor will work
for this one. See http://www.brettglass.com/logmonitors/paper.html for more. 

--Brett

P.S. -- I'm still working on the replacement logging system mentioned in
that paper. It has an entirely new architecture; the hard part has been
backward compatibility with older Unices and with programs that expect to
communicate with syslogd.


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.3.2.7.2.20020622165052.02209380>