Re: [us...@httpd] Stealthing a vhost

2010-05-27 Thread Peter Horn
Jorge wrote: >The sane sultion would be to setup a default host (first vhost == default) and just deny all access to it. >You'll still get hit but all requests without a hostname get denied. Jorge, You may have missed my original post a few days ago (95182). I know many ways to deny access; w

Re: [us...@httpd] Stealthing a vhost

2010-05-27 Thread Jorge Schrauwen
The sane sultion would be to setup a default host (first vhost == default) and just deny all access to it. You'll still get hit but all requests without a hostname get denied. ~Jorge On Thu, May 27, 2010 at 1:10 PM, Peter Horn wrote: > J Greenlees wrote: > > >personally, I would consider a pe

Re: [us...@httpd] Stealthing a vhost

2010-05-27 Thread Peter Horn
J Greenlees wrote: >personally, I would consider a permanent redirect to 127.0.0.1 for all but your one excepted case on access of the default virtual host. >their bots will screw their own server that way. ;) Sorry to bring you the bad news, Jaqui, but bots don't respect redirection. I suspe

Re: [us...@httpd] Stealthing a vhost

2010-05-26 Thread Igor Cicimov
Ok for the first problem, apache responding to the OPTIONS request...What about Limit and LimitExcept commands? Limiting the OPTIONS to the local network or blocking them totally maybe? Cheers On Thu, May 27, 2010 at 2:10 PM, J. Greenlees wrote: > Peter Horn wrote: > >> On 06:59, Igor Cicimov w

Re: [us...@httpd] Stealthing a vhost

2010-05-26 Thread J. Greenlees
Peter Horn wrote: On 06:59, Igor Cicimov wrote: > > Have you tried mod_security? It's very configurable so might suite your needs. > ~snip~ I have read the mod_security docs, and it appears that the 'drop' action is not available in my environment (Windows). ~snip~ Peter Then you may h

Re: [us...@httpd] Stealthing a vhost

2010-05-26 Thread Peter Horn
On 06:59, Igor Cicimov wrote: > > Have you tried mod_security? It's very configurable so might suite your needs. > > Sent from my phone >> On May 20, 2010 3:52 PM, "Peter Horn" wrote: >> >> I have a home server running 4 name vhosts, using a dynamic DNS. The second, third and fourth vhosts are

Re: [us...@httpd] Stealthing a vhost

2010-05-20 Thread Igor Cicimov
Have you tried mod_security? It's very configurable so might suite your needs. Sent from my phone On May 20, 2010 3:52 PM, "Peter Horn" wrote: I have a home server running 4 name vhosts, using a dynamic DNS. The second, third and fourth vhosts are "real" and known to the DNS. The default (first

[us...@httpd] Stealthing a vhost

2010-05-19 Thread Peter Horn
I have a home server running 4 name vhosts, using a dynamic DNS. The second, third and fourth vhosts are "real" and known to the DNS. The default (first) vhost is only accessible by IP address (or an abstruse and unpublished servername). It gets quite a bit of traffic by IP address which is cle