27.01.2014 Views

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

NIST 800-44 Version 2 Guidelines on Securing Public Web Servers

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

GUIDELINES ON SECURING PUBLIC WEB SERVERS<br />

Error Log—Each error is represented as <strong>on</strong>e entry, including an explanati<strong>on</strong> of the reas<strong>on</strong> for this<br />

error report.<br />

Agent Log—This log c<strong>on</strong>tains informati<strong>on</strong> about the user client software used to access <strong>Web</strong> c<strong>on</strong>tent.<br />

Referrer Log—This log collects informati<strong>on</strong> relevant to HTTP access. This includes the URL of the<br />

page that c<strong>on</strong>tained the link that the user client software followed to initiate access to the <strong>Web</strong> page.<br />

Most <strong>Web</strong> servers support the Transfer Log, and it is usually c<strong>on</strong>sidered the most important. Several log<br />

formats are available for Transfer Log entries. Typically, the informati<strong>on</strong> is presented in plain American<br />

Standard Code for Informati<strong>on</strong> Interchange (ASCII) without special delimiters to separate the different<br />

fields [Alle00]:<br />

Comm<strong>on</strong> Log Format (CLF)—This format stores informati<strong>on</strong> related to <strong>on</strong>e transfer (Transfer Log)<br />

in the following order:<br />

• Remote host<br />

• Remote user identity in accordance with RFC 1413 73<br />

• Authenticated user in accordance with the basic authenticati<strong>on</strong> scheme (see<br />

Secti<strong>on</strong> 7.3)<br />

• Date<br />

• URL requested<br />

• Status of the request<br />

• Number of bytes actually transferred.<br />

Combined Log Format—This format c<strong>on</strong>tains the same seven fields above. It also provides<br />

informati<strong>on</strong> normally stored in the Agent Log and the Referrer Log, al<strong>on</strong>g with the actual transfer.<br />

Keeping this informati<strong>on</strong> in a c<strong>on</strong>solidated log format may support more effective administrati<strong>on</strong>.<br />

Extended Log Format—This format provides a way to describe all items that should be collected<br />

within the log file. The first two lines of the log file c<strong>on</strong>tain the versi<strong>on</strong> and the fields to be collected,<br />

and they appear in the log file as follows:<br />

#<str<strong>on</strong>g>Versi<strong>on</strong></str<strong>on</strong>g>: 1.0<br />

#Fields: date time c-ip sc-bytes time-taken cs-versi<strong>on</strong><br />

1999-08-01 02:10:57 192.0.0.2 6340 3 HTTP/1.0<br />

This example c<strong>on</strong>tains the date, time, originating address, number of bytes transmitted, time taken<br />

for transmissi<strong>on</strong>, and HTTP versi<strong>on</strong>.<br />

Other Log File Formats—Some server software provides log informati<strong>on</strong> in different file formats,<br />

such as database formats or delimiter-separated formats. Other server software provides the<br />

73<br />

See the IETF <strong>Web</strong> site: http://www.ietf.org/rfc/rfc1413.txt.<br />

9-2

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!