DoS attack in the wild
leccine at gmail.com
Tue Jun 23 13:22:57 MSD 2009
Yeah I agree, basically it is not easy to take down nginx with such an
attack. The question is still there, what kind of limitations do we have to
put in place to avoid such an abuser?
-firewall -> max connection by ips
-firewall -> syn proxy(to avoid syn attacks)
-firewall -> connection rate
-OS -> max open sockets by processes
-OS -> tcp/ip stack tuning, allocated memory
-OS -> max CPU time
-OS -> max used memory(slightly different terminology all across unixes)
-webserver-> max fds, running workers etc.
Basically you have to have a multi layer limitation to avoid resource
abusing and then you can sleep well :)
On Tue, Jun 23, 2009 at 9:09 AM, Weibin Yao <nbubingo at gmail.com> wrote:
> István at 2009-6-23 15:46 wrote:
>> I am not able to reproduce this. The server is answering and serving
>> ./slowloris.pl -dns doma.in <http://doma.in> -port 80 -timeout 2 -num
>> The load is zero, there is not even a delay in the response time. Would
>> you mind to share your slowloris.pl command and/or the nginx relevant
>> config, OS type and version, sysctl.conf(or equivalent).
>> It would be also nice to know what the nginx is doing in that time, do you
>> have dtrace on that node? Enable debug level logging in nginx is a really
>> bad idea if you have 5000 requests...
>> /"But if you have enough attack computers, you also can make a Nginx
>> server deny service."/
>> If you have enough computer you can take down even google.com <
>> http://google.com>, this is not relevant to this conversation, moreover
>> the slowloris is a dedicated tool to low bandwith/low amount of computers
>> I'm sorry for my misunderstanding with your last mail. My meaning is
> that Nginx has much better performance under such attack.
> In my test case, I reduce the worker_connections to only 1024 because I
> just have one attack computer.
> And my test script is:
> ./slowloris.pl -dns doma.in <http://doma.in> -port 80 -timeout 30 -num
> 10000 -tcpto 5
> Weibin Yao
the sun shines for all
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the nginx