Welcome to ftp.nluug.nl Current directory: /pub/ftp/os/Linux/distr/salix/sbo/14.0/network/mod_evasive/ |
|
Contents of README:mod_evasive maneuvers module for Apache to provide evasive action in the event of an HTTP DoS or DDoS attack or brute force attack. It is also designed to be a detection and network management tool, and can be easily configured to talk to ipchains, firewalls, routers, and etcetera. mod_evasive presently reports abuses via email and syslog facilities. Detection is performed by creating an internal dynamic hash table of IP Addresses and URIs, and denying any single IP address from any of the following: * Requesting the same page more than a few times per second * Making more than 50 concurrent requests on the same child per second * Making any requests while temporarily blacklisted (on a blocking list) You'll need to add the following line to your /etc/httpd/httpd.conf file: Include /etc/httpd/extra/mod_evasive.conf To test enter the following command: perl /usr/doc/mod_evasive-$VERSION/test.pl | more which should output some HTTP/1.1 200 OK lines; then HTTP/1.1 403 Forbidden mod_evasive is fully tweakable through the Apache configuration file, see the README file in the package's documentation directory. |
Name Last modified Size
Parent Directory - README 15-Apr-2011 10:47 1.1K doinst.sh 15-Apr-2011 10:47 612 fixup-for-httpd24.diff 29-Sep-2012 06:34 3.6K mod_evasive.SlackBuild 02-Oct-2012 19:59 2.2K mod_evasive.conf 27-May-2010 06:51 307 mod_evasive.info 29-Sep-2012 06:34 337 slack-desc 27-May-2010 06:51 844
NLUUG - Open Systems. Open Standards
Become a member
and get discounts on conferences and more, see the NLUUG website!