Re: Ddos

2022-05-02 Thread Michael Thompson
You’ll have to be a little more specific than that Im afraid. > On 2 May 2022, at 01:55, Christopher Jennings > wrote: > > Help with vulnerabilities

Ddos

2022-05-01 Thread Christopher Jennings
Help with vulnerabilities

AW: OpenVPN DDoS Fix

2014-12-02 Thread Denny Bortfeldt
Hey there, I'm sorry for my typo. Yes, I mean 2.3.6. Sincerely, Denny Von: Dr. Volker Thieme [mailto:volker.thieme+deb...@mailbox.org] Gesendet: Montag, 1. Dezember 2014 21:13 An: Denny Bortfeldt Cc: debian-security@lists.debian.org Betreff: Re: OpenVPN DDoS Fix Hi! On 01 Dec 2014, at

Re: OpenVPN DDoS Fix

2014-12-01 Thread Dr. Volker Thieme
Hi! On 01 Dec 2014, at 17:17, Denny Bortfeldt wrote: > Hello everyone! > > Is anyone in touch with the new openvpn update 2.6.3 and know when it will be > released in debian repo? Did you mean 2.3.6? Sincerely, Volker —

Re: OpenVPN DDoS Fix

2014-12-01 Thread Alberto Gonzalez Iniesta
On Mon, Dec 01, 2014 at 04:17:50PM +, Denny Bortfeldt wrote: > Hello everyone! > > Is anyone in touch with the new openvpn update 2.6.3 and know when it will be > released in debian repo? > Read more at https://forums.openvpn.net/topic17625.html > The update in on the works. Since the test

OpenVPN DDoS Fix

2014-12-01 Thread Denny Bortfeldt
Hello everyone! Is anyone in touch with the new openvpn update 2.6.3 and know when it will be released in debian repo? Read more at https://forums.openvpn.net/topic17625.html Thanks in advance! Sincerely, Denny

Re: mod_security (was: Apache "DDOS" with random number request)

2008-09-22 Thread Alberto Gonzalez Iniesta
On Mon, Sep 22, 2008 at 08:16:01AM +0200, Stefan Fritsch wrote: > On Monday 22 September 2008, Felipe Figueiredo wrote: > > > Try modsecurity, it should block invalid URI > > > > Speaking of which, shouldn't it be re-included in Debian now that > > the licensing issue[1] is supposed to be over[2]?

mod_security (was: Apache "DDOS" with random number request)

2008-09-21 Thread Stefan Fritsch
On Monday 22 September 2008, Felipe Figueiredo wrote: > > Try modsecurity, it should block invalid URI > > Speaking of which, shouldn't it be re-included in Debian now that > the licensing issue[1] is supposed to be over[2]? There is already an ITP bug, but I don't know the current status. http:/

Re: Apache "DDOS" with random number request

2008-09-21 Thread Felipe Figueiredo
On Mon, 2008-09-22 at 09:15 +1000, Stephen Vaughan wrote: > Try modsecurity, it should block invalid URI > Speaking of which, shouldn't it be re-included in Debian now that the licensing issue[1] is supposed to be over[2]? 1. http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=352344 2. http://blo

Re: Apache "DDOS" with random number request

2008-09-21 Thread Michael Loftis
435 (apache). If we get a "DDOS" we make a tcpdump and count the IPs (maximum 8 Dial Up Accounts) to block them on our Firewall. I don´t find any about this strange request on Google or some security boards. Is this a new kind of DDOS or just kiddy stuff? If someone have some

Re: Apache "DDOS" with random number request

2008-09-21 Thread Stephen Vaughan
ur Webserverfarm and finally after 5 Minutes the Webserver(s) get > out of memory: > > > > Out of Memory: Kill process 12082 (apache) score 199722 and children. > > Out of memory: Killed process 19435 (apache). > > > > If we get a "DDOS" we make a tcpdump

Apache "DDOS" with random number request

2008-09-21 Thread NeMiX
Client make about 80-100 strange Request per Minute and we get a peak on our Webserverfarm and finally after 5 Minutes the Webserver(s) get out of memory: Out of Memory: Kill process 12082 (apache) score 199722 and children. Out of memory: Killed process 19435 (apache). If we get a "DDO

Re: Follow up on the NCSDRecover DDOS perl script

2003-06-19 Thread Jordan Lederman
Robert, The only way to truly recover from a break-in, is to fully restore the system from a trusted medium. That being said, here's what your script does: 1) Hide it's name in the process table as '/usr/sbin/nscd ' (100 spaces). 2) Bind to UDP port 1337 in order

Re: Follow up on the NCSDRecover DDOS perl script

2003-06-19 Thread Jordan Lederman
Robert, The only way to truly recover from a break-in, is to fully restore the system from a trusted medium. That being said, here's what your script does: 1) Hide it's name in the process table as '/usr/sbin/nscd ' (100 spaces). 2) Bind to UDP port 1337 in order

Follow up on the NCSDRecover DDOS perl script

2003-06-18 Thread Robert Ebright
ect me yesterday, but I had put www-data on cron.deny and thus it prevented the script from being ran. I think that a lot of people are probably falling prey to this DDOS script right now based upon e-mails I've received from people. Shouldn't the apache user be automatically denied from

Follow up on the NCSDRecover DDOS perl script

2003-06-18 Thread Robert Ebright
ect me yesterday, but I had put www-data on cron.deny and thus it prevented the script from being ran. I think that a lot of people are probably falling prey to this DDOS script right now based upon e-mails I've received from people. Shouldn't the apache user be automatically denied from