[ale] anybody got a stock .htaccess for read-only apache website
Alex Carver
agcarver+ale at acarver.net
Fri Aug 11 15:12:10 EDT 2017
If you only have static pages that are not PHP and no plugins enabled
then my guess would be a side-channel attack where the attackers
compromised an adjacent server and were able to break into the file
storage outside of the one they attacked.
On 2017-08-11 12:07, Neal Rhodes wrote:
> Thank you for the reply, but it totally baffles me. This is totally different
> from prior topic I raised on a different server.
>
> Someone is scanning all the godaddy hosted servers, and is embedding .php files
> in them, and updating the .htaccess file, in an apparent attempt to hijack
> innocent browser users accessing the sites supported there, which for me is
> essentially the Lilburn Oktoberfest, the Lloyd Shaw Dance foundation, and Maine
> Geneology.
>
> I have found and removed all the .php files they created. Apparently they
> attempted to rewrite rules to re-direct access to html file into their
> duplicated .php files.
>
> I have removed the glop they added to the .htaccess, but don't know if there are
> other restrictive measures I should be taking in there to reduce the potential
> in the future.
>
> I do not see how this relates to rsync and ssh.
>
>
>
> On Fri, 2017-08-11 at 14:32 -0400, DJ-Pfulio wrote:
>> I would assume a php addon has a security problem or some custom php code has
>> some flaw.
>>
>> Is there a reason rsync+ssh isn't used - or even git? git cryptographically
>> validates. "Because we never needed to before" **is** a value answer. ;)
>>
>>
>> On 08/11/2017 02:12 PM, Neal Rhodes wrote:
>> > Apparently my Godaddy linux apache website has been hacked by someone who
>> > planted some bogus .php files, and overwrote my primary .htaccess.
>> >
>> > Godaddy discovered it.
>> >
>> > I removed the offending .php files.
>> >
>> > I removed the clauses in the primary .htaccess which appeared to feed those
>> > bogus .php files.
>> >
>> > I have asked Godaddy to provide me with their recommended stock, restrictive
>> > .htaccess file for read-only websites. All of our static html is updated by
>> > me via ssh. I do not know how someone managed to alter my website. I would
>> > guess they used some tool Godaddy provides which isn't configured properly to
>> > restrict, or which has a default login.
>> >
>> > Thus far they are running around in circles.
>> >
>> > Does anyone have a best practices .htaccess file to start with? I'm guessing it
>> > would be something starting with...
>> >
>> > IndexIgnore .htpasswd .htaccess */.??* *~ *# */HEADER* */README* */_vti*
>> >
>> > <Limit POST PUT DELETE>
>> > require valid-user
>> > </Limit>
>> >
>> > AuthName webuser
>> > AuthUserFile /var/www/cgi-bin/.htpasswd
>> >
>> > AuthType Basic
>> >
>> _______________________________________________
>> Ale mailing list
>> Ale at ale.org <mailto:Ale at ale.org>
>> http://mail.ale.org/mailman/listinfo/ale
>> See JOBS, ANNOUNCE and SCHOOLS lists at
>> http://mail.ale.org/mailman/listinfo
>
>
>
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> http://mail.ale.org/mailman/listinfo/ale
> See JOBS, ANNOUNCE and SCHOOLS lists at
> http://mail.ale.org/mailman/listinfo
>
More information about the Ale
mailing list