lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <42E4A409.5020109@gnucitizen.org> Date: Mon Jul 25 09:34:32 2005 From: ppetkov at gnucitizen.org (Petko Petkov) Subject: Anonymous Web Attacks via DedicatedMobileServices -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Bojan Zdrnja wrote: > > >> -----Original Message----- From: >> full-disclosure-bounces@...ts.grok.org.uk >> [mailto:full-disclosure-bounces@...ts.grok.org.uk] On Behalf Of >> Morning Wood Sent: Wednesday, 20 July 2005 5:02 a.m. To: Petko >> Petkov; bugtraq@...urityfocus.com Cc: >> full-disclosure@...ts.grok.org.uk Subject: Re: [Full-disclosure] >> Anonymous Web Attacks via DedicatedMobileServices >> >> google's language translation also does this.. >> http://ipchicken.com >> http://translate.google.com/translate?u=http://ipchicken.com > > > Regarding Google - yes, if you log only connections. However, when > you use translate.google.com service, Google will add a new header > in the HTTP request: > > X-Forwarded-For: <IP address> > > All proxy servers should add this header, even in the case of > multiple proxying, in which case all IP addresses should be listed > under this header. > > For Apache, there is even a mod_extract_forwarded module which > should change the connection so it looks like it's coming from the > IP behind the proxy server. > > > I don't see any special risk with this, even for mobile devices > (mentioned in the original post) -- a proxy just does it's job, no > matter which proxy it is. If Google keeps logs, even if you don't > save X-Forwarded-For header and parse them, you can find out who > visited the web page, if it goes to investigation. > > Cheers, > > Bojan > > _______________________________________________ Full-Disclosure - > We believe in it. Charter: > http://lists.grok.org.uk/full-disclosure-charter.html Hosted and > sponsored by Secunia - http://secunia.com/ > > > Hi Bojan, You are completely right that proxy servers do their job and it is easy to trace back the intruder if this is the case. And you are right that proxy servers have their own configuration files and log files. Regarding Google ? no, Google is too big. If you compromise a server in Romania I doubt that Google Inc. will be very helpful in this case. Google has massive amount of log files that needs to be processed and examined. Don?t get me wrong; I believe that Google has the power to find your intruder. The question is if everybody start hacking with WMLProxy, how responsive Google would be? On the other hand, it is very likely to see Web Attacks executed from Simple Mobile Phones that have WAP enabled. Now, this is my concern. An attacker can spend around ?40 for cheap WAP device plus SIM. I believe that it is a reasonable price for not going in jail. X-Forwarded-For is a nice feature. I love it. Some people are not even aware of it. But, in reality, it doesn?t works always the way we want it. All the best, Petko -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (MingW32) iD8DBQFC5KQEFf/6vxAyUpgRAt3aAKCDt0tTgo1JZm0psben+MTkzcTpqQCgpsbV L/DE/w+pmoVlWYrmFZ0V0wk= =JCur -----END PGP SIGNATURE-----
Powered by blists - more mailing lists