AW: AW: [us...@httpd] Connection flood: how to protect?

2009-04-14 Thread Kanstantin Reznichak
...@newmediagateway.com] Gesendet: Dienstag, 14. April 2009 21:25 An: users@httpd.apache.org Betreff: Re: AW: [us...@httpd] Connection flood: how to protect? Kanstantin Reznichak wrote: > The script from my first post send the single "GET / HTTP 1.1" line, > followed by . The request

AW: [us...@httpd] Connection flood: how to protect?

2009-04-14 Thread Kanstantin Reznichak
l 2009 22:14 An: users@httpd.apache.org Betreff: Re: [us...@httpd] Connection flood: how to protect? It was thus said that the Great Kanstantin Reznichak once stated: > Hello, > > Thank you for reply. Unfortunately, mod-limitipconn seems to act too late. > After installing and enabling

AW: [us...@httpd] Connection flood: how to protect?

2009-04-14 Thread Kanstantin Reznichak
liche Nachricht- Von: William A. Rowe, Jr. [mailto:wr...@rowe-clan.net] Gesendet: Dienstag, 14. April 2009 22:15 An: users@httpd.apache.org Betreff: Re: [us...@httpd] Connection flood: how to protect? Kanstantin Reznichak wrote: > Hello, > > Thank you for reply. Unfortunately, mod-lim

AW: [us...@httpd] Connection flood: how to protect?

2009-04-14 Thread Kanstantin Reznichak
r, I'm not really sure whether that's a bug or not... -Ursprüngliche Nachricht- Von: Justin Pasher [mailto:just...@newmediagateway.com] Gesendet: Dienstag, 14. April 2009 19:57 An: users@httpd.apache.org Betreff: Re: [us...@httpd] Connection flood: how to protect? Kanstantin Reznichak

RE: [us...@httpd] Connection flood: how to protect?

2009-04-14 Thread Kanstantin Reznichak
respond to HTTP anymore... -Ursprüngliche Nachricht- Von: Justin Pasher [mailto:just...@newmediagateway.com] Gesendet: Montag, 13. April 2009 22:47 An: users@httpd.apache.org Cc: k.reznic...@pcpin.com Betreff: Re: [us...@httpd] Connection flood: how to protect? Kanstantin Reznichak wrote

[us...@httpd] Connection flood: how to protect?

2009-04-13 Thread Kanstantin Reznichak
Hello, One of my servers was affected by TCP flood attack targeted to http service (Apache 2.2.8). Short attack description: an attacker opens large amount of TCP connections to Apache service and sends few bytes (for example, a single "GET / HTTP/1.1" line) to every opened connection. The HTTP