Thanks Yann,
# apache2ctl -V
Server version: Apache/2.4.7 (Ubuntu)
Server built: Jul 24 2015 17:25:11
Server's Module Magic Number: 20120211:27
Server loaded: APR 1.5.1-dev, APR-UTIL 1.5.3
Compiled using: APR 1.5.1-dev, APR-UTIL 1.5.3
Architecture: 64-bit
Server MPM: worker
threaded:
I am interested in both
Thanks
Sent from my iPad
> On Mar 8, 2016, at 3:27 PM, Christopher Schultz
> wrote:
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA1
>
> John
>
>> On 3/8/16 2:43 PM, Rose, John B wrote:
>> Looking for comments on mod_clamav, and any other alternative
>> antivirus
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
John
On 3/8/16 2:43 PM, Rose, John B wrote:
> Looking for comments on mod_clamav, and any other alternative
> antivirus software for Apache on linux
Are you trying to protect your clients or your servers?
- -chris
-BEGIN PGP SIGNATURE-
Comme
Looking for comments on mod_clamav, and any other alternative antivirus
software for Apache on linux
On Tue, Mar 8, 2016 at 4:44 PM, hildegard meier wrote:
> OS:
> Ubuntu 14.04 LTS
>
> Kernel:
> 3.13.0-79-generic x86_64
>
> Apache:
> 2.4.7-1ubuntu4.5
What's the output of:
# apachectl -V
?
-
To unsubscribe, e-mail: users-unsubsc
On 03/08/16 1:34 PM, Yann Ylavic wrote:
> Hi,
>
> On Tue, Mar 8, 2016 at 11:36 AM, Miguel González
> wrote:
>>
>> I suspect that the previous connections trying to explote xmlrpc.php are
>> now just being logged and shown as "Waiting for connection".
>>
>> Maybe the iptables rule should be differ
OS:
Ubuntu 14.04 LTS
Kernel:
3.13.0-79-generic x86_64
Apache:
2.4.7-1ubuntu4.5
The Host has just been release-upgraded (with Ubuntu do-release-upgrade
command) From Ubuntu 12.04 LTS
All Apache config files are the new ones, old configuration entries have been
adopted to the new config files m
Hi,
BTW, one other piece of possible information: We found that if we put all the
PEMs for the CRLs into one big file and then used the
SSLCACertificateRevocationFile directive instead of the
SSLCACertificateRevocationPath directive and the hashes in the directory, then
we don't get the Error
Hi,
On Tue, Mar 8, 2016 at 11:36 AM, Miguel González
wrote:
>
> I suspect that the previous connections trying to explote xmlrpc.php are
> now just being logged and shown as "Waiting for connection".
>
> Maybe the iptables rule should be different?
Did you try REJECT instead of DROP?
Regards,
Y
Dear all,
I have a Cpanel with Apache webserver running and I have seen many
xmlrpc accesses from fake Google bots. In my pursue of blocking those
connections I enable the following rules in my csf (iptables based
firewall):
iptables -I INPUT -p tcp --dport 80 -m state --state NEW -m recent
--n
10 matches
Mail list logo