nginx limit_req and limit_conn not working to prevent DoS attack

Anoop Alias anoopalias01 at gmail.com
Wed Aug 2 03:26:39 UTC 2017


You can use an external tool to parse Nginx error log and block the IP in
iptables/netfilter

On Wed, Aug 2, 2017 at 7:43 AM, Phani Sreenivasa Prasad <
nginx-forum at forum.nginx.org> wrote:

> I assume it would help dropping connections . since we are setting rate
> limit per ip and any client IP which is suspicious by sending requests in
> bulk(lets say 10000 connections/requests), it makes sense to not to accept
> connections/requests from that IP.
>
> Thoughts ??
>
> Posted at Nginx Forum: https://forum.nginx.org/read.
> php?2,275796,275798#msg-275798
>
> _______________________________________________
> nginx mailing list
> nginx at nginx.org
> http://mailman.nginx.org/mailman/listinfo/nginx
>



-- 
*Anoop P Alias*
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.nginx.org/pipermail/nginx/attachments/20170802/8045083a/attachment.html>


More information about the nginx mailing list