<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Alien traffic through my server in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/alien-traffic-through-my-server/m-p/2991261#M77533</link>
    <description>I am using IPchains with similar restrictions to your suggestion. So far the alien traffic is blocked. It seems to be coming from search engines. One; tencent.com out of China was hitting my  proxy server thousands of times a day. As soon as I restricted my mod_proxy tencent.com stopped hitting my server. This leads me to think that some search engines automatically scan for open proxy's and exploit them.&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Mon, 09 Jun 2003 12:50:43 GMT</pubDate>
    <dc:creator>Vernon Brown_3</dc:creator>
    <dc:date>2003-06-09T12:50:43Z</dc:date>
    <item>
      <title>Alien traffic through my server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/alien-traffic-through-my-server/m-p/2991252#M77524</link>
      <description>In my Apache log file I see thousands of entries like the following:&lt;BR /&gt;&lt;BR /&gt;202.102.138.28 - - [01/Jun/2003:04:02:52 -0500] "GET &lt;A href="http://ad.doubleclick.net/adi/N1684.TMP.com/B1151947.27;sz=720x300;ord=2470014?" target="_blank"&gt;http://ad.doubleclick.net/adi/N1684.TMP.com/B1151947.27;sz=720x300;ord=2470014?&lt;/A&gt; HTTP/1.1" 200 3303 "&lt;A href="http://www.entwww.com/" target="_blank"&gt;http://www.entwww.com/&lt;/A&gt;" "Mozilla/4.0 (compatible; MSIE 5.5; Windows 98)"&lt;BR /&gt;211.94.204.40 - - [01/Jun/2003:04:13:57 -0500] "GET &lt;A href="http://ad.doubleclick.net/ad/max.travelrate/ros;sz=468x60;ord='%20+%20ord%20+%20'?" target="_blank"&gt;http://ad.doubleclick.net/ad/max.travelrate/ros;sz=468x60;ord='%20+%20ord%20+%20'?&lt;/A&gt; HTTP/1.0" 302 0 "&lt;A href="http://www.travelrate.co.uk/" target="_blank"&gt;http://www.travelrate.co.uk/&lt;/A&gt;" "Mozilla/4.0 (compatible; MSIE 5.5; Windows 98)"&lt;BR /&gt;&lt;BR /&gt;Neither the source nor destination are on my server. Does anyone know how this can happen, or better yet, how to stop it.</description>
      <pubDate>Fri, 06 Jun 2003 16:40:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/alien-traffic-through-my-server/m-p/2991252#M77524</guid>
      <dc:creator>Vernon Brown_3</dc:creator>
      <dc:date>2003-06-06T16:40:07Z</dc:date>
    </item>
    <item>
      <title>Re: Alien traffic through my server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/alien-traffic-through-my-server/m-p/2991253#M77525</link>
      <description>Sounds like mod_proxy is wide open. Disable it entirely if you can.&lt;BR /&gt;&lt;BR /&gt;If you are using Tomcat backends without the AJP connector, then simply set ProxyRequest Off since it is not needed for ProxyPass.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 06 Jun 2003 22:24:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/alien-traffic-through-my-server/m-p/2991253#M77525</guid>
      <dc:creator>Jordan Bean</dc:creator>
      <dc:date>2003-06-06T22:24:43Z</dc:date>
    </item>
    <item>
      <title>Re: Alien traffic through my server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/alien-traffic-through-my-server/m-p/2991254#M77526</link>
      <description>Yes; mod-proxy was wide open. I need Apache to act as a proxy server for my LAN, but didn't restrict it to my LAN.  I'll try to do that.&lt;BR /&gt;&lt;BR /&gt;Thanks</description>
      <pubDate>Fri, 06 Jun 2003 22:34:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/alien-traffic-through-my-server/m-p/2991254#M77526</guid>
      <dc:creator>Vernon Brown_3</dc:creator>
      <dc:date>2003-06-06T22:34:44Z</dc:date>
    </item>
    <item>
      <title>Re: Alien traffic through my server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/alien-traffic-through-my-server/m-p/2991255#M77527</link>
      <description>Apache2?&lt;BR /&gt;&lt;BR /&gt;ProxyRequests On&lt;BR /&gt;&lt;PROXY&gt;&lt;BR /&gt;Order deny,allow&lt;BR /&gt;Deny from all&lt;BR /&gt;Allow from ...&lt;BR /&gt;&lt;/PROXY&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 06 Jun 2003 22:49:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/alien-traffic-through-my-server/m-p/2991255#M77527</guid>
      <dc:creator>Jordan Bean</dc:creator>
      <dc:date>2003-06-06T22:49:01Z</dc:date>
    </item>
    <item>
      <title>Re: Alien traffic through my server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/alien-traffic-through-my-server/m-p/2991256#M77528</link>
      <description>Worked great after a couple of tries!! I am now seeing many access denied proxy requests coming from all over.&lt;BR /&gt;&lt;BR /&gt;Makes me wonder what benifit they get from using my server as a proxy.</description>
      <pubDate>Sat, 07 Jun 2003 01:45:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/alien-traffic-through-my-server/m-p/2991256#M77528</guid>
      <dc:creator>Vernon Brown_3</dc:creator>
      <dc:date>2003-06-07T01:45:09Z</dc:date>
    </item>
    <item>
      <title>Re: Alien traffic through my server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/alien-traffic-through-my-server/m-p/2991257#M77529</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Being a ethical hacker I hope I can answer.&lt;BR /&gt;&lt;BR /&gt;I want to attack Victim's webserver through some browser. &lt;BR /&gt;&lt;BR /&gt;i want to use directory transversal exploit or chucked encoding exploit etc .&lt;BR /&gt;&lt;BR /&gt;i know that the victim's server is certainly vulnerable for the above exploits.&lt;BR /&gt;&lt;BR /&gt;I want to hide my real IP address logged in victim's firewall or Webserver. So what I will do is to connect normally to Internet thru some dialin account ( DHCP setup do more good to hackers ). Set the Proxy settings of my Internet browser to point your open proxy.&lt;BR /&gt;&lt;BR /&gt;Now thru my browser i connect to &lt;A href="http://www.victim.com" target="_blank"&gt;www.victim.com&lt;/A&gt;&lt;BR /&gt;and work out my attacks or  espionage the victim's cgi scripts , OS platform , etc..&lt;BR /&gt;&lt;BR /&gt; your Proxy server will relay my HTTP request packets to victims web server with your own source IP. So my IP address is hidden from the victim's log files. But your open proxy's IP address will be logged in victims log files.&lt;BR /&gt;&lt;BR /&gt;So this open proxies are selected across countries. I will remain untraceable to a greatest extentt mostly because of factors like Political Restrictions , lack of different ISP co-ordination etc..&lt;BR /&gt;&lt;BR /&gt;regards,&lt;BR /&gt;&lt;BR /&gt;U.SivaKumar&lt;BR /&gt;&lt;BR /&gt;Disclaimer: I shall not be liable for any security breach caused by the reader of this thread. This reply is in good faith meant to enlighten the innocents.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Sat, 07 Jun 2003 02:08:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/alien-traffic-through-my-server/m-p/2991257#M77529</guid>
      <dc:creator>U.SivaKumar_2</dc:creator>
      <dc:date>2003-06-07T02:08:17Z</dc:date>
    </item>
    <item>
      <title>Re: Alien traffic through my server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/alien-traffic-through-my-server/m-p/2991258#M77530</link>
      <description>Vernon,&lt;BR /&gt;&lt;BR /&gt;I guess you don???t see the beauty of what U.SivaKumar has done for you by posting that reply.&lt;BR /&gt;&lt;BR /&gt;It???s just my humble, uneducated opinion, but I think you really did him an injustice by giving him a single point only for that explanation.&lt;BR /&gt;&lt;BR /&gt;Sorry, I know you didn???t ask for my input on this.  I just can???t help but voice my thoughts on this one.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;BTW --  Please assign me a 0 for this post.  I just wanted to vent???&lt;BR /&gt;&lt;BR /&gt;Have a nice day...&lt;BR /&gt;</description>
      <pubDate>Sun, 08 Jun 2003 19:41:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/alien-traffic-through-my-server/m-p/2991258#M77530</guid>
      <dc:creator>John Collier</dc:creator>
      <dc:date>2003-06-08T19:41:17Z</dc:date>
    </item>
    <item>
      <title>Re: Alien traffic through my server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/alien-traffic-through-my-server/m-p/2991259#M77531</link>
      <description>You are right of course. I thought I clicked a 10 but when it came up it was a 1. Since I didn't know how to change it other than to get him to re-post I let it go.&lt;BR /&gt;&lt;BR /&gt;Sorry about that; I'll try to do better.&lt;BR /&gt;&lt;BR /&gt;Vern</description>
      <pubDate>Sun, 08 Jun 2003 21:07:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/alien-traffic-through-my-server/m-p/2991259#M77531</guid>
      <dc:creator>Vernon Brown_3</dc:creator>
      <dc:date>2003-06-08T21:07:17Z</dc:date>
    </item>
    <item>
      <title>Re: Alien traffic through my server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/alien-traffic-through-my-server/m-p/2991260#M77532</link>
      <description>I have a recommendation.&lt;BR /&gt;&lt;BR /&gt;Install iptables immediately.&lt;BR /&gt;&lt;BR /&gt;Keep only those ports open necessary to the operation of your web server.&lt;BR /&gt;&lt;BR /&gt;The following iptables configuration which can be modified and installed in the file /etc/sysconfig/iptables can provide stately proxy services to an entire network while keeping most ports secure.&lt;BR /&gt;&lt;BR /&gt;Modify the config to work with your own network.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I will insert # changeme's above the lines you MUST change.&lt;BR /&gt; &lt;BR /&gt;  # Generated by iptables-save v1.2.5 on Sun Oct 20 02:43:53 2002&lt;BR /&gt;*nat&lt;BR /&gt;:PREROUTING ACCEPT [11:792]&lt;BR /&gt;:POSTROUTING ACCEPT [31:2763]&lt;BR /&gt;:OUTPUT ACCEPT [31:2763]&lt;BR /&gt;-A POSTROUTING -o eth0 -j &lt;BR /&gt;# changeme to your network&lt;BR /&gt;SNAT --to-source 66.92.143.194 &lt;BR /&gt;COMMIT&lt;BR /&gt;# Completed on Sun Oct 20 02:43:53 2002&lt;BR /&gt;# Generated by iptables-save v1.2.5 on Sun Oct 20 02:43:53 2002&lt;BR /&gt;*filter&lt;BR /&gt;:INPUT ACCEPT [30:2771]&lt;BR /&gt;:FORWARD ACCEPT [0:0]&lt;BR /&gt;:OUTPUT ACCEPT [38:3507]&lt;BR /&gt;:okay - [0:0]&lt;BR /&gt;# changeme to your network&lt;BR /&gt;-A INPUT -s 192.168.0.0/255.0.0.0 -i eth1 -j ACCEPT &lt;BR /&gt;-A INPUT -s 127.0.0.1 -i lo -j ACCEPT &lt;BR /&gt;-A INPUT -s 192.168.0.1 -i lo -j ACCEPT &lt;BR /&gt;# changeme to your network&lt;BR /&gt;-A INPUT -s 66.92.143.194 -i lo -j ACCEPT &lt;BR /&gt;# changeme to your network&lt;BR /&gt;-A INPUT -s 192.168.0.40 -i eth1 -j ACCEPT &lt;BR /&gt;# changeme to your network&lt;BR /&gt;-A INPUT -s 192.168.0.255 -i lo -j ACCEPT &lt;BR /&gt;# changeme to your network&lt;BR /&gt;-A INPUT -d 66.92.143.221 -m state --state RELATED,ESTABLISHED -j ACCEPT &lt;BR /&gt;-A INPUT -i eth0 -p tcp -m tcp --dport 21 -j okay &lt;BR /&gt;-A INPUT -i eth0 -p tcp -m tcp --dport 22 -j okay &lt;BR /&gt;-A INPUT -i eth1 -p tcp -m tcp --dport 22 -j okay &lt;BR /&gt;-A INPUT -i eth0 -p tcp -m tcp --dport 23 -j okay &lt;BR /&gt;-A INPUT -i eth0 -p tcp -m tcp --dport 25 -j okay &lt;BR /&gt;-A INPUT -i eth0 -p tcp -m tcp --dport 80 -j okay &lt;BR /&gt;-A INPUT -i eth1 -p tcp -m tcp --dport 80 -j okay &lt;BR /&gt;-A INPUT -i eth0 -p tcp -m tcp --dport 110 -j okay &lt;BR /&gt;-A INPUT -i eth0 -p tcp -m tcp --dport 123 -j okay &lt;BR /&gt;-A INPUT -i eth0 -p udp -m udp --dport 53 -j ACCEPT &lt;BR /&gt;-A INPUT -i eth1 -p udp -m udp --dport 53 -j ACCEPT &lt;BR /&gt;-A INPUT -i eth0 -p udp -m udp --dport 2074 -j ACCEPT &lt;BR /&gt;-A INPUT -i eth0 -p udp -m udp --dport 4000 -j ACCEPT &lt;BR /&gt;-A INPUT -i eth0 -p icmp -m icmp --icmp-type 8 -j ACCEPT &lt;BR /&gt;-A INPUT -i eth0 -p icmp -m icmp --icmp-type 11 -j ACCEPT &lt;BR /&gt;-A FORWARD -i eth1 -j ACCEPT &lt;BR /&gt;-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT &lt;BR /&gt;-A okay -p tcp -m tcp --tcp-flags SYN,RST,ACK SYN -j ACCEPT &lt;BR /&gt;-A okay -p tcp -m state --state RELATED,ESTABLISHED -j ACCEPT &lt;BR /&gt;-A okay -p tcp -j DROP &lt;BR /&gt;COMMIT&lt;BR /&gt;# Completed on Sun Oct 20 02:43:53 2002&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;This came off my production SNAT server which is also my backup web server for my 24/7 web hosting business.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Sun, 08 Jun 2003 21:50:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/alien-traffic-through-my-server/m-p/2991260#M77532</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2003-06-08T21:50:59Z</dc:date>
    </item>
    <item>
      <title>Re: Alien traffic through my server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/alien-traffic-through-my-server/m-p/2991261#M77533</link>
      <description>I am using IPchains with similar restrictions to your suggestion. So far the alien traffic is blocked. It seems to be coming from search engines. One; tencent.com out of China was hitting my  proxy server thousands of times a day. As soon as I restricted my mod_proxy tencent.com stopped hitting my server. This leads me to think that some search engines automatically scan for open proxy's and exploit them.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 09 Jun 2003 12:50:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/alien-traffic-through-my-server/m-p/2991261#M77533</guid>
      <dc:creator>Vernon Brown_3</dc:creator>
      <dc:date>2003-06-09T12:50:43Z</dc:date>
    </item>
    <item>
      <title>Re: Alien traffic through my server</title>
      <link>https://community.hpe.com/t5/operating-system-linux/alien-traffic-through-my-server/m-p/2991262#M77534</link>
      <description>You are right !&lt;BR /&gt;What is worse, there are lists of opened proxies available at hack sites. SivaKumar really gave you a good advice.&lt;BR /&gt;Check in any google 'public proxy' (or proxies) + your public IP, you'll certainly get several sites referencing yours.&lt;BR /&gt;There are autoscanners, but they also have webmaster. My advice is to send them a mail asking firmly to remove your IP from the list. &lt;BR /&gt;Lats time I had this issue, I warned them that if I hadn't been removed within 2 working days, I would set up a script to flood their IP every time I would be proxy used. Afraid or not, it worked.&lt;BR /&gt;Tencent seems to be a normal company, but they may be used as relay from mainland China to scan the rest of the world.&lt;BR /&gt;hth&lt;BR /&gt;J</description>
      <pubDate>Mon, 09 Jun 2003 14:54:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/alien-traffic-through-my-server/m-p/2991262#M77534</guid>
      <dc:creator>Jerome Henry</dc:creator>
      <dc:date>2003-06-09T14:54:26Z</dc:date>
    </item>
  </channel>
</rss>

