DDoS protection module suggestion
Payam Chychi
pchychi at gmail.com
Fri Nov 5 10:30:05 MSK 2010
Hey,
Instead of a 503, i would redirect them localhost:81 and allow them to
validly themselves via captcha system in case its a false positive.
Like above, if a host logs the same src_ip more than $x times in $xy
min, u should be moving the acl up the chain, your sub-distribution,
distribution cor or even edge routers.
my 2 cents
-Payam
malte wrote:
> Weibin Yao Wrote:
>
>> We are facing the similar DDOS situation to you.
>> I'm developing a module
>> which can deny the individual IPs. The module can
>> get the IPs with a
>> POST request from a commander server in the
>> intranet. If you have some
>> suggestions, you can contact to me.
>>
>> The module will be here:
>> https://github.com/yaoweibin/nginx_limit_access_mo
>> dule, but I need some
>> more days to finish it.
>>
>
>
> Wonderful!
> Being able to interrogate the server for a list of bad IPs is an
> excellent idea, it would allow people to make their own firewall-block
> scripts etc.
>
> The main suggestion I have is that the module supports this kind of
> rule:
> If an IP has requested more than X pages in the last Y seconds, then
> serve only 503 errors to that IP for the next Z seconds, and use at most
> W megabytes of RAM for the bad-IP pool.
>
> Posted at Nginx Forum: http://forum.nginx.org/read.php?2,147105,147863#msg-147863
>
>
> _______________________________________________
> nginx mailing list
> nginx at nginx.org
> http://nginx.org/mailman/listinfo/nginx
>
>
More information about the nginx
mailing list