× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Passing thought - if you are having trouble with looking at the logs, go to the green screen, type "NETSTAT", then I try option 3. That should show activity based on FROM and TO IP address and port number. That can help track this kind of thing down.

Good luck.
________________________________________
From: WEB400 [web400-bounces@xxxxxxxxxxxx] on behalf of Jim Oberholtzer [midrangel@xxxxxxxxxxxxxxxxx]
Sent: Friday, September 12, 2014 9:12 AM
To: 'Web Enabling the IBM i (AS/400 and iSeries)'
Subject: Re: [WEB400] Experience with Qualys Guard (cross posted on web400 as well)

We do have the logs Scott and will be following up on your suggestions, but
we know the Qualys Guard scan is running during the time the "attack"
happens so there is a strong link there.

Analysis starts in earnest today.

--
Jim Oberholtzer
Chief Technical Architect
Agile Technology Architects


-----Original Message-----
From: WEB400 [mailto:web400-bounces@xxxxxxxxxxxx] On Behalf Of Scott
Sent: Thursday, September 11, 2014 8:30 PM
To: Web Enabling the IBM i (AS/400 and iSeries); 'Midrange L'
Subject: Re: [WEB400] Experience with Qualys Guard (cross posted on web400
as well)

Do you have access to the logs (access.log/php.log/error.log)? That would
tell you where the requests are coming from (which can be spoofed) and what
they are requesting, then you could use that as backup to ask them why it is
doing what it is doing, or it might show you that the requests aren't coming
from where you think they are.

Scott

On 9/11/2014 8:22 AM, Jim Oberholtzer wrote:
Folks:



I got a call yesterday from a customer that is having trouble with a
Qualys Guard scan. Apparently it scans systems for vulnerabilities
but when it comes to a port that has a PHP server on it (in this case
Zend Server), it starts sending over 1000 transactions a second at it, so
it becomes a DOS
attack. Qualys firmly denies doing a DOS but I can't understand why the
burst of transactions. Any thoughts?



--

Jim Oberholtzer

Chief Technical Architect

Agile Technology Architects




--
This is the Web Enabling the IBM i (AS/400 and iSeries) (WEB400) mailing
list To post a message email: WEB400@xxxxxxxxxxxx To subscribe, unsubscribe,
or change list options,
visit: http://lists.midrange.com/mailman/listinfo/web400
or email: WEB400-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives at
http://archive.midrange.com/web400.


--
This is the Web Enabling the IBM i (AS/400 and iSeries) (WEB400) mailing list
To post a message email: WEB400@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/web400
or email: WEB400-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/web400.



This message has been scanned for viruses by MailControl - www.mailcontrol.com

Click https://www.mailcontrol.com/sr/MZbqvYs5QwJvpeaetUwhCQ== to report this email as spam



If the reader of this email is not the intended recipient(s), please be advised that any dissemination, distribution or copying of this information is strictly prohibited. Johnson Matthey PLC has its main place of business at 5th Floor, 25 Farringdon Street, London (020 7269 8400).

Johnson Matthey Public Limited Company
Registered Office: 5th Floor, 25 Farringdon Street, London EC4A 4AB
Registered in England No 33774

Whilst Johnson Matthey aims to keep its network free from viruses you should note that we are unable to scan certain emails, particularly if any part is encrypted or password-protected, and accordingly you are strongly advised to check this email and any attachments for viruses. The company shall NOT ACCEPT any liability with regard to computer viruses transferred by way of email.

Please note that your communication may be monitored in accordance with Johnson Matthey internal policy documentation.

This message has been scanned for viruses by MailControl - www.mailcontrol.com

As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.