Apache Security - Ivan Ristic [215]
brute-force, Brute-Force Attacks
DDoS, Distributed Denial of Service Attacks
distributed, Distributed Denial of Service Attacks
egress filtering, Source Address Spoofing
Linux SYN cookies defense, SYN Flood Attacks
malformed traffic, Malformed Traffic
reflection, Reflection DoS Attacks
source address spoofing, Source Address Spoofing
SYN flood, SYN Flood Attacks
self-inflicted, Self-Inflicted Attacks, Badly Configured Apache, Poorly Designed Web Applications, Poorly Designed Web Applications, Poorly Designed Web Applications, Real-Life Client Problems, Real-Life Client Problems, Real-Life Client Problems
Apache badly configured, Badly Configured Apache
caching and cacheability, Poorly Designed Web Applications
client problems, real-life, Real-Life Client Problems
database connection bottleneck, Poorly Designed Web Applications
large files, Real-Life Client Problems
slow clients, Real-Life Client Problems
web applications poorly designed, Poorly Designed Web Applications
traffic spikes, Traffic Spikes, Content Compression, Bandwidth Attacks, Cyber-Activism, Cyber-Activism, The Slashdot Effect
bandwidth stealing (hotlinking), Bandwidth Attacks
content compression, Content Compression
coordinated DoS attacks, Cyber-Activism
cyber-activism, Cyber-Activism
Slashdot effect, The Slashdot Effect
traffic-shaping modules, Traffic-Shaping Modules
types of, Denial of Service Attacks
DSA (Digital Signature Algorithm) public-key encryption, Asymmetric Encryption
dynamic-content problems, Dynamic-Content Problems, Dynamic-Content Problems, Dynamic-Content Problems, Execution wrappers, FastCGI, Per-request change of Apache identity, Perchild MPM and Metux MPM, Multiple Apache instances
execution wrappers, Execution wrappers
FastCGI, FastCGI
identity change per-request, Per-request change of Apache identity
mod_perchild module versus Metux MPM, Perchild MPM and Metux MPM
multiple server instances, Multiple Apache instances
ptrace, Dynamic-Content Problems
solutions, Dynamic-Content Problems
E
Elliptic curve public-key encryption, Asymmetric Encryption
enable_dl configuration directive, Running PHP as a Module
encryption, Cryptography, Symmetric Encryption, Asymmetric Encryption, One-Way Encryption, How It All Falls into Place, How It All Falls into Place, How It All Falls into Place, OpenSSL Benchmark Script
asymmetric (public-key), Asymmetric Encryption, How It All Falls into Place, OpenSSL Benchmark Script
one-way, One-Way Encryption, How It All Falls into Place
private-key (symmetric), Symmetric Encryption, How It All Falls into Place
env_audit leakage tool, Information Leaks on Execution Boundaries
error logging, Setting Logging Options, Error Logging, Error Logging
levels listing, Error Logging
turning on for PHP, Setting Logging Options
error messages, verbose, vulnerability, Verbose Error Messages
ErrorLog directive, Error Logging
event monitoring, Event Monitoring, Periodic reporting, Swatch, Simple Event Correlator, Simple Event Correlator
periodic reporting, Periodic reporting
SEC, Simple Event Correlator, Simple Event Correlator
rules types, Simple Event Correlator
Swatch, Swatch
F
FastCGI, FastCGI
FastCGI protocol, FastCGI
file descriptor leakage vulnerability, Information Leaks on Execution Boundaries, Information Leaks on Execution Boundaries
files, File access restrictions, Real-Life Client Problems, Virtual filesystems for users, File Upload Interception, File Integrity, File Integrity, File Disclosure, Path Traversal, Application Download Flaws, Source Code Disclosure, Predictable File Locations, Reviewing file permissions, Reviewing the files
access restrictions, PHP, File access restrictions
configuration review of, Reviewing the files
large causing DoS, Real-Life Client Problems
monitoring integrity, File Integrity