Re: nginx limit_req and limit_conn not working to prevent DoS attack

2017-08-02 Thread Valery Kholodkov
@nginx.org <mailto:nginx@nginx.org> Subject: Re: nginx limit_req and limit_conn not working to prevent DoS attack Yes. Firewall would be another option. But before to that, i would like to try out all options at nginx level if one or other would resolve the issue

Re: nginx limit_req and limit_conn not working to prevent DoS attack

2017-08-02 Thread B.R. via nginx
; triggered the limit. > > > Original Message > From: nginx-fo...@forum.nginx.org > Sent: August 1, 2017 9:08 PM > To: nginx@nginx.org > Reply-to: nginx@nginx.org > Subject: Re: nginx limit_req and limit_conn not working to prevent DoS > attack > > Yes. Firewall wo

Re: nginx limit_req and limit_conn not working to prevent DoS attack

2017-08-01 Thread Gary Sellani
thing related to a university could generate a number of simultaneous users behind one IP. In my case Boeing triggered the limit.   Original Message   From: nginx-fo...@forum.nginx.org Sent: August 1, 2017 9:08 PM To: nginx@nginx.org Reply-to: nginx@nginx.org Subject: Re: nginx limit_req and limit_con

Re: nginx limit_req and limit_conn not working to prevent DoS attack

2017-08-01 Thread Phani Sreenivasa Prasad
Yes. Firewall would be another option. But before to that, i would like to try out all options at nginx level if one or other would resolve the issue at nginx layer itself. cant we put accept() filters? or how the deny option works? can we use deny option to not to accept any new connections if n

Re: nginx limit_req and limit_conn not working to prevent DoS attack

2017-08-01 Thread Gary Sellani
mSent: August 1, 2017 8:26 PMTo: nginx@nginx.orgReply-to: nginx@nginx.orgSubject: Re: nginx limit_req and limit_conn not working to prevent DoS attack You can use an external tool to parse Nginx error log and block the IP in iptables/netfilter On Wed, Aug 2, 2017 at 7:43 AM, Phani Sreenivasa P

Re: nginx limit_req and limit_conn not working to prevent DoS attack

2017-08-01 Thread Anoop Alias
You can use an external tool to parse Nginx error log and block the IP in iptables/netfilter On Wed, Aug 2, 2017 at 7:43 AM, Phani Sreenivasa Prasad < nginx-fo...@forum.nginx.org> wrote: > I assume it would help dropping connections . since we are setting rate > limit per ip and any client IP whi

Re: nginx limit_req and limit_conn not working to prevent DoS attack

2017-08-01 Thread Phani Sreenivasa Prasad
I assume it would help dropping connections . since we are setting rate limit per ip and any client IP which is suspicious by sending requests in bulk(lets say 1 connections/requests), it makes sense to not to accept connections/requests from that IP. Thoughts ?? Posted at Nginx Forum: https

Re: nginx limit_req and limit_conn not working to prevent DoS attack

2017-08-01 Thread Zhang Chao
Hi! I don’t think just drop the connection is a good idea, client will never know what happens on the server end. However, the code 444 may help you, nginx just close the connection in this case. On 2 August 2017 at 09:30:01, Phani Sreenivasa Prasad ( nginx-fo...@forum.nginx.org) wrote: Hi All,

nginx limit_req and limit_conn not working to prevent DoS attack

2017-08-01 Thread Phani Sreenivasa Prasad
Hi All, I am using nginx in our products. When I run goldeneye DoS attack script against nginx, it is not able to defend against the attack and normal users getting impacted. python goldeneye.py http:// -w 5 -s 1 -m random -d we are using below nginx limit_req options but didnt help. The n