How can I make it appear as though I'm not running Apache? I figure the best way is to appear as though it is another type of httpd, like lighthttpd or iis. I know that by using mod_security you can change your server signature into anything:
SecServerSignature "Microsoft IIS"
Does anyone know of other tricks in obscuring the HTTPD being used?
Why would you attempt this?
There are so many obvious and non-obvious ways that apache httpd reveals itself. Spend your time on real security instead. Version identifiers, stock pages, HTTP headers and loaded modules are just some of the ways Apache httpd reveals itself.
Run apache with a few modules loaded as possible. Ship logs off to another host and do real-time log analysis.
Design your system so that a compromise of apache doesn't lead to direct access to whatever you're trying to protect.
There are 2 ways. The simplest is to add this to your apache config file :
The other one is to change this file /src/include/httpd.h in the apache source. Change :
to
Then recomplie apache.
Others solutions may exits, try "Apache banner faking" on google.
One can tell that Apache is being run from the style and content of the stock error pages (404, 500, etc.). Specify your own.
As Holst stated, you should really question why you you are wanting to obscure your host. Obscurity is one mechanism for security, but should be assumed to be the weakest, and as such needs to be only one layer in a much more robust security architecture.
I would highly recommend reviewing the CIS Benchmark for Apache and implementing whatever can be used in your environment. Along with NIST, the Center for Internet Security benchmarks are often used as the basis for standard configurations. Which is great, since the Professional Feed from Nessus includes audit files for comparing against the CIS benchmarks. Moreover, this puts you on the road towards a standard configuration that can be easily audited and greatly lowers the risks associated with attempting to adequately manage a multitude of dissimilar systems.
Going back to the original question, the CIS Apache Benchmark v2.2 recommend the following settings for Information Leakage Protection