Vesta Control Panel - Forum

Community Forum

Skip to content

Advanced search
  • Quick links
    • Main site
    • Github repo
    • Google Search
  • FAQ
  • Login
  • Register
  • Board index Main Section General Discussion
  • Search

How to prevent "Host header attack" ?

General questions about VestaCP
Post Reply
  • Print view
Advanced search
1 post • Page 1 of 1
Spheerys
Posts: 225
Joined: Tue Dec 29, 2015 12:36 pm

Os: Debian 7x
Web: apache + nginx
How to prevent "Host header attack" ?
  • Quote

Post by Spheerys » Thu Jul 02, 2020 7:51 pm

Hi,

My VestaCP server seams to be used to make requests know as "Host header attack".
Someone is launching hundred request to inexistant subdomains of real hosted domain.
Here an example of request :

Code: Select all

server.domain.net - - [04/May/2020:13:56:22 +0200] "GET /license?api_key=<snip>&username=Me_website&uuid=793b341d-ca63-411a-beca-c4cadfbfc512&database=mysql&revolution_version=Revolution-2.7.3-pl&supports=Revolution-2.7.3-pl&http_host=inexistantsubdomain.existantdomain.net&php_version=7.2.24-0ubuntu0.18.04.4&language=fr&key=35a947f2465a1d5cac32d01952dfac66&package=agenda HTTP/1.1" 200 429 "-" "Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; .NET CLR 1.0.3705; .NET CLR 1.1.4322; Media Center PC 4.0)"
I'm looking for the best way to correct this by manipuling Content-Security-Policy inside the /etc/apache2/conf.d/92.xxx.bbb.69.conf file, but I don't know wich rule to use...

Is someone know how to doing this ?
Top


Post Reply
  • Print view
1 post • Page 1 of 1

Return to “General Discussion”



  • Board index
  • All times are UTC
  • Delete all board cookies
  • The team
Powered by phpBB® Forum Software © phpBB Limited
*Original Author: Brad Veryard
*Updated to 3.2 by MannixMD
 

 

Login  •  Register

I forgot my password