Hi Mastercan,
As of now NGINX is supporting HTTP/2 Natively here is how to activate it.
https://atulhost.com/enable-http2-nginx
Posted at Nginx Forum:
https://forum.nginx.org/read.php?2,269749,269863#msg-269863
___
nginx mailing list
nginx@nginx.org
So to prevent flooding / spam by bots especially since some bots are just
brutal when they crawl by within milliseconds jumping to every single page
they can get.
I am going to apply limit's to my PHP block
limit_req_zone $binary_remote_addr zone=one:10m rate=1r/s;
limit_conn_zone $binary_remote_
You might want to check out tinfoilsecurity.com to evaluate Naxsi. Microsoft
uses them for azure. I pass all their tests.
As I stated a few times, I only serve static pages. I can get away with
homebrew hacking detection. But I think you are kidding yourself if you think a
stack of WAF rules
On Mon, Sep 26, 2016 at 4:28 AM, Anoop Alias wrote:
> Ok .. reiterating my original question.
>
> Is the usage of if / map in nginx config more efficient than say naxsi (
> or libmodsecurity ) for something like blocking SQL injection ?
>
Strictly speaking, and barring performance costs of th
Anoop Alias Wrote:
---
> Ok .. reiterating my original question.
>
> Is the usage of if / map in nginx config more efficient than say
> naxsi (
> or libmodsecurity ) for something like blocking SQL injection ?
>
> For example,
> https://githu
I'm not sure the number of virtual hosts matters since each attack is individual. But if 500 vhosts meant say a hundred customers, I sure wouldn't want to deal with the false positives in your email. Much like set
Ok .. reiterating my original question.
Is the usage of if / map in nginx config more efficient than say naxsi (
or libmodsecurity ) for something like blocking SQL injection ?
For example,
https://github.com/nbs-system/naxsi/blob/master/naxsi_config/naxsi_core.rules
rules 1000-1099 - blockes
Im now testing what said sys nginx :
worker_processes 1;
Try 1 first and the error is fixed you can increase it to 4 or 8
Posted at Nginx Forum:
https://forum.nginx.org/read.php?2,269787,269850#msg-269850
___
nginx mailing list
nginx@nginx.org
http://
For one thing, I have trouble making fail2ban work. ;-) I run sshguard, so the
major port 22 hacking is covered. And that is continous.
I don't know if fail2ban can read nginx logs. I thought you need to run swatch,
which requires actual perl skill to set up.
In any event, my 444 is harmless o
Hello,
I don't agree with Robert Paprocki: adding modules like naxsi or modsecurity
to nginx is not a solution. They have bugs, performance hits, need patch
when there's new versions of nginx,...
gariac, you say you send 444 to hackers then use a script to display those.
Why not use fail2ban to s
also :
2016/09/26 10:26:22 [emerg] 14146#14146: posix_memalign(16, 16384) failed
(12: Cannot allocate memory)
Posted at Nginx Forum:
https://forum.nginx.org/read.php?2,269787,269847#msg-269847
___
nginx mailing list
nginx@nginx.org
http://mailman.nginx
just now
2016/09/26 10:18:52 [emerg] 5027#5027: malloc(4096) failed (12: Cannot
allocate memory)
2016/09/26 10:18:53 [emerg] 5043#5043: malloc(4096) failed (12: Cannot
allocate memory)
2016/09/26 10:18:54 [emerg] 5048#5048: malloc(4096) failed (12: Cannot
allocate memory)
2016/09/26 10:18:54 [emerg
I doubt I could patch source. (I know my limits.) But reverse DNS seems very
useful. Someone should fix the module.
Original Message
From: A. Schulze
Sent: Monday, September 26, 2016 12:33 AM
To: nginx@nginx.org
Reply To: nginx@nginx.org
Subject: Re: fake googlebots / nginx-http-rdns
lists:
lists:
Nginx has a reverse DNS module:
https://github.com/flant/nginx-http-rdns
for an older version from 20140411 I have a patch. That version works
without problems.
--- nginx-1.10.1.orig/nginx-http-rdns-20140411/ngx_http_rdns_module.c
+++ nginx-1.10.1/nginx-http-rdns-20140411/ngx_http_
No error after 24 hours now, nginx version without modules was 1 part of the
solution
Now I tweak aio nginx with this :
directio_alignment 4k;
Posted at Nginx Forum:
https://forum.nginx.org/read.php?2,269787,269843#msg-269843
___
nginx mailing list
ng
15 matches
Mail list logo