Re: limit_conn not working

2017-12-19 Thread Maxim Dounin
Hello! On Tue, Dec 19, 2017 at 09:17:33PM +0300, Maxim Dounin wrote: > On Tue, Dec 19, 2017 at 06:03:46PM +0100, Abilio Marques wrote: > > > For me the documentation reads in a way in which a connection with > > keep-alive that already received one request satisfies those two conditions: > > - I

Re: limit_conn not working

2017-12-19 Thread Maxim Dounin
Hello! On Tue, Dec 19, 2017 at 06:03:46PM +0100, Abilio Marques wrote: > For me the documentation reads in a way in which a connection with > keep-alive that already received one request satisfies those two conditions: > - It has a request processed by the server. (processed is past tense, which

RE: [IE] Re: limit_conn not working

2017-12-19 Thread Jason Whittington
Behalf Of Abilio Marques Sent: Tuesday, December 19, 2017 8:29 AM To: nginx@nginx.org Subject: [IE] Re: limit_conn not working Thanks, I imagined to be something like that, but this is not obvious from the documentation. Is there a way to clarify it for future readers? On Tue, Dec 19, 2017 at 3:26

Re: limit_conn not working

2017-12-19 Thread Abilio Marques
For me the documentation reads in a way in which a connection with keep-alive that already received one request satisfies those two conditions: - It has a request processed by the server. (processed is past tense, which is true after the first one was made) - The whole request has already been read

Re: limit_conn not working

2017-12-19 Thread Maxim Dounin
Hello! On Tue, Dec 19, 2017 at 03:29:22PM +0100, Abilio Marques wrote: > I imagined to be something like that, but this is not obvious from the > documentation. Is there a way to clarify it for future readers? The documentation already says (http://nginx.org/en/docs/http/ngx_http_limit_conn_mod

Re: limit_conn not working

2017-12-19 Thread Abilio Marques
Thanks, I imagined to be something like that, but this is not obvious from the documentation. Is there a way to clarify it for future readers? On Tue, Dec 19, 2017 at 3:26 PM, Maxim Dounin wrote: > Hello! > > On Tue, Dec 19, 2017 at 06:36:00AM +0100, Abilio Marques wrote: > > > limit_conn is no

Re: limit_conn not working

2017-12-19 Thread Maxim Dounin
Hello! On Tue, Dec 19, 2017 at 06:36:00AM +0100, Abilio Marques wrote: > limit_conn is not working for me. I set up a test in nodejs, I'm doing GET > requests to http://localhost/, they are coming from different connections > (different origin ports), and all the connections are still open until

limit_conn not working

2017-12-18 Thread Abilio Marques
limit_conn is not working for me. I set up a test in nodejs, I'm doing GET requests to http://localhost/, they are coming from different connections (different origin ports), and all the connections are still open until the very end, still, no response other than 200 is received. I double check wit

Re: nginx limit_req and limit_conn not working to prevent DoS attack

2017-08-02 Thread Valery Kholodkov
@nginx.org <mailto:nginx@nginx.org> Subject: Re: nginx limit_req and limit_conn not working to prevent DoS attack Yes. Firewall would be another option. But before to that, i would like to try out all options at nginx level if one or other would resolve the issue

Re: nginx limit_req and limit_conn not working to prevent DoS attack

2017-08-02 Thread B.R. via nginx
; triggered the limit. > > > Original Message > From: nginx-fo...@forum.nginx.org > Sent: August 1, 2017 9:08 PM > To: nginx@nginx.org > Reply-to: nginx@nginx.org > Subject: Re: nginx limit_req and limit_conn not working to prevent DoS > attack > > Yes. Firewall wo

Re: nginx limit_req and limit_conn not working to prevent DoS attack

2017-08-01 Thread Gary Sellani
thing related to a university could generate a number of simultaneous users behind one IP. In my case Boeing triggered the limit.   Original Message   From: nginx-fo...@forum.nginx.org Sent: August 1, 2017 9:08 PM To: nginx@nginx.org Reply-to: nginx@nginx.org Subject: Re: nginx limit_req and limit_con

Re: nginx limit_req and limit_conn not working to prevent DoS attack

2017-08-01 Thread Phani Sreenivasa Prasad
Yes. Firewall would be another option. But before to that, i would like to try out all options at nginx level if one or other would resolve the issue at nginx layer itself. cant we put accept() filters? or how the deny option works? can we use deny option to not to accept any new connections if n

Re: nginx limit_req and limit_conn not working to prevent DoS attack

2017-08-01 Thread Gary Sellani
mSent: August 1, 2017 8:26 PMTo: nginx@nginx.orgReply-to: nginx@nginx.orgSubject: Re: nginx limit_req and limit_conn not working to prevent DoS attack You can use an external tool to parse Nginx error log and block the IP in iptables/netfilter On Wed, Aug 2, 2017 at 7:43 AM, Phani Sreenivasa P

Re: nginx limit_req and limit_conn not working to prevent DoS attack

2017-08-01 Thread Anoop Alias
You can use an external tool to parse Nginx error log and block the IP in iptables/netfilter On Wed, Aug 2, 2017 at 7:43 AM, Phani Sreenivasa Prasad < nginx-fo...@forum.nginx.org> wrote: > I assume it would help dropping connections . since we are setting rate > limit per ip and any client IP whi

Re: nginx limit_req and limit_conn not working to prevent DoS attack

2017-08-01 Thread Phani Sreenivasa Prasad
I assume it would help dropping connections . since we are setting rate limit per ip and any client IP which is suspicious by sending requests in bulk(lets say 1 connections/requests), it makes sense to not to accept connections/requests from that IP. Thoughts ?? Posted at Nginx Forum: https

Re: nginx limit_req and limit_conn not working to prevent DoS attack

2017-08-01 Thread Zhang Chao
Hi! I don’t think just drop the connection is a good idea, client will never know what happens on the server end. However, the code 444 may help you, nginx just close the connection in this case. On 2 August 2017 at 09:30:01, Phani Sreenivasa Prasad ( nginx-fo...@forum.nginx.org) wrote: Hi All,

nginx limit_req and limit_conn not working to prevent DoS attack

2017-08-01 Thread Phani Sreenivasa Prasad
Hi All, I am using nginx in our products. When I run goldeneye DoS attack script against nginx, it is not able to defend against the attack and normal users getting impacted. python goldeneye.py http:// -w 5 -s 1 -m random -d we are using below nginx limit_req options but didnt help. The n