Re: Connection flood: how to protect?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Kanstantin Reznichak wrote:

Hello,

One of my servers was affected by TCP flood attack targeted to http service (Apache 2.2.8). Short attack description: an attacker opens large amount of TCP connections to Apache service and sends few bytes (for example, a single “GET / HTTP/1.1” line) to every opened connection. The HTTP service opens a new process for every such connection and waits for further input. After a short time, HTTPd runs out of connection limit and stops responding.

Some of my servers are protected by state tracking firewall that protects them against such kind of attack.

My question: is there possible to configure Apache HTTPd in order to protect it against these attacks?


Check out mod_limitipconn. You can restrict the number of simultaneous connections from individual IP addresses.

http://dominia.org/djao/limitipconn.html


--
Justin Pasher

---------------------------------------------------------------------
The official User-To-User support forum of the Apache HTTP Server Project.
See <URL:http://httpd.apache.org/userslist.html> for more info.
To unsubscribe, e-mail: users-unsubscribe@xxxxxxxxxxxxxxxx
  "   from the digest: users-digest-unsubscribe@xxxxxxxxxxxxxxxx
For additional commands, e-mail: users-help@xxxxxxxxxxxxxxxx


[Index of Archives]     [Open SSH Users]     [Linux ACPI]     [Linux Kernel]     [Linux Laptop]     [Kernel Newbies]     [Security]     [Netfilter]     [Bugtraq]     [Squid]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Samba]     [Video 4 Linux]     [Device Mapper]

  Powered by Linux