| I don't do 444 for rate limiting. I figure a hacker doesn't deserve a response. I see the occasional double request, but not 10. Most likely the entity trying to log into my WordPress control panel is not typing on a keyboard into a browser. It is a script with fake user agent. Oh, and I don't use WordPress. ;-) I had a nice fake Baidu spider today. Obvious hacking related to Joomla. (Don't use that either.) No dupes, it just went down the script. The real Baidu spider is a pig. I have blocked their actual IP space, so I only get fake Baidu spiders that come back to Chinese ISPs. I serve so few 444s a day, it is hardly worth the energy to discuss. Now it is fair to claim because all requests are examined by maps, that is where I am using resources.
Keep in mind a terminated connection (444) is not a valid HTTP response. Abruptly terminated connections may also be caused by broken middleware boxes or other things interrupting the connection. Modern browsers have retry mechanisms built in to safeguard against transient connection issues, for example, returning 444 to a Firefox client will cause it to retry the request up to 10 (!) times. This is the opposite of what you want in a rate limited scenario. Stick with 429 or 503. On Wed, Sep 28, 2016 at 7:30 PM, <[email protected]> wrote:
| ||||
_______________________________________________ nginx mailing list [email protected] http://mailman.nginx.org/mailman/listinfo/nginx
