Re: [no subject]

2019-04-12 Thread lists
Perhaps a dumb question, but if all you are going to do is return a 403, why not just do this filtering in the firewall by blocking the offending IP space. Yeah I know a server should always have some response, but it isn't like you would be the first person to just block entire countries. (I don

Re: [no subject]

2019-04-13 Thread lists
many different things - but that doesn’t mean it’s right to expect that it does everything.PeterSent from my iPhoneOn Apr 12, 2019, at 10:57 PM, lists <li...@lazygranch.com> wrote: Perhaps a dumb question, but if all you are going to do is return a 403, why not just do this filtering in the fir

Re: nginx stopped working

2019-05-11 Thread lists
https://gist.github.com/xameeramir/a5cb675fb6a6a64098365e89a239541d This claims to be the original.   Original Message   From: wiz...@bnnorth.net Sent: May 11, 2019 6:40 AM To: nginx@nginx.org Reply-to: nginx@nginx.org Subject: nginx stopped working Can someone give me a copy of

Re: nginx use of UDP ports?

2019-06-14 Thread lists
Tracing or interprocess communication?   Original Message   From: nginx@nginx.org Sent: June 14, 2019 2:17 PM To: nginx@nginx.org; mdou...@mdounin.ru Reply-to: nginx@nginx.org Cc: vgrin...@akamai.com Subject: Re: nginx use of UDP ports? On 6/12/19 4:31 AM, Maxim Dounin wrote: > Hell

Re: Allow internal redirect to URI x, but deny external request for x?

2019-08-30 Thread lists
I've been following this thread not really out of need but rather that it is really interesting. That said, I don't think for security you want to "escape" the web root. The risk is that might aid a traversal attack.   Original Message   From: hobso...@gmail.com Sent: August 30

Re: Allow internal redirect to URI x, but deny external request for x?

2019-08-31 Thread lists
est for x? Hi Mark, On 30/08/19 22:23, lists wrote: > I've been following this thread not really out of need but rather that it is > really interesting. That said, I don't think for security you want to > "escape" the web root. The risk is that might aid a travers

Re: ssl setup please

2019-09-27 Thread lists
What shows up in the log files? Do you really need to use Cloudflare? Have you been DDoSed? I view Cloudflare as a man in the middle. I've been using Let's Encrypt for about a year with no drama.   Original Message   From: nginx-fo...@forum.nginx.org Sent: September 27, 2019 2:

Re: PR_END_OF_FILE_ERROR after kernel update

2019-10-03 Thread lists
You could test the cert using SSL labs. https://www.ssllabs.com/ You might have a drop your firewall if it doesn't work at first. It never hurts to do dumb stuff like boot the server again.   Original Message   From: wiz...@bnnorth.net Sent: October 3, 2019 8:55 PM To: nginx@ngi

Re: SSL handshake attack mitigation

2019-11-06 Thread lists
IMHO you did the right thing with fail2ban. I don't see how a firewall is "expensive" other than they they are a little RAM heavy. Half the internet traffic is bots. That doesn't even count the hot linkers. So the reality is you will need a firewall to block what doesn't have eyeballs, namely da

Re: Per IP bandwidth limit

2019-11-11 Thread lists
I am not currently using any bandwidth limiting features so I can't comment on how it is done currently. However in the past I use the one built into Nginx and tested it with a download manager. My recollection is you could open more streams but the net effect was the download stayed at the same

Re: Expert needed to Tune Nginx For Best Performance

2019-11-18 Thread lists
There are websites that check web server performance. I haven't bothered with them in years, but the suggestions on browser caching were useful. Google will find half a dozen. 

Re: Nginx Valid Referer - Access Control - Help Wanted

2020-02-07 Thread lists
If you are going to block one thing, eventually you will block two, then three, etc. I suggest learning how to use "map". https://www.edmondscommerce.co.uk/handbook/Servers/Config/Nginx/Blocking-URLs-in-batch-using-nginx-map/   Original Message   From: nginx-fo...@forum.nginx.org Sent

Re: Prevent direct access to files but allow download from site

2020-03-11 Thread lists
You could make it harder to pass around the URL if it is dynamic. That is make the url session related. You can do a search on "uncrawlable" and then exactly the opposite of what they suggest. That is most people want to be crawled, so their advice is backwards. One thing to watch out for is

Re: TLS 1.3 not offered and downgraded to a weaker protocol

2020-03-11 Thread lists
Run openssl versionThe problem is openssl is too old for TLS 1.3 using Centos 7.You might want to read this:https://forums.centos.org/viewtopic.php?t=71848I have seen threads on building openssl so that you can support tls 1.3 on Centos 7. The trouble is once you build something it is your problem

Re: Rewrite -- failure

2020-04-14 Thread lists
Wouldn't it be less work to set up subdomains and handle this with DNS? I for one will never qualify for this T shirt. https://store.xkcd.com/products/i-know-regular-expressions   Original Message   From: p...@stormy.ca Sent: April 14, 2020 1:39 PM To: nginx@nginx.org Reply-to: nginx@nginx

Re: How to hide kernel information

2020-04-27 Thread lists
Well I know nmap can detect the OS. I don't recall it could detect the rev of the kernel. https://nmap.org/book/man-os-detection.htmlhttps://nmap.org/book/defenses.html

Re: How to hide kernel information

2020-04-27 Thread lists
: April 27, 2020 10:54 PMTo: nginx@nginx.orgReply-to: nginx@nginx.orgSubject: Re: How to hide kernel information SINFP method is used to get the kernel information.On Tue, Apr 28, 2020 at 11:10 AM lists <li...@lazygranch.com> wrote: Well I know nmap can detect the OS. I don't reca

Re: How to hide kernel information

2020-04-28 Thread lists
Not to get too far off topic, but unless your server is important (government, financial, etc.), it is most likely the hacks it will receive are just "sprayed." They don't care what rev of OS you are running. The hacker tries a number of exploits on IP space known to host servers. Who you are is

Re: Force Nginx to log error?

2020-06-14 Thread lists
I'm not sure I understand the question, but how does this sound? I use a map to catch requests that I don't want. For instance I return a 444 if I receive a "wget".   Original Message   From: c...@tunnel53.net Sent: June 14, 2020 5:40 AM To: nginx@nginx.org Reply-to: nginx@ngi

Re: Force Nginx to log error?

2020-06-14 Thread lists
That clears it up. Most of what I see in the error log is stuff I have no idea how to fix. I will Google some errors and see what is fixable. The deal is my websites work for me and I get no complaints. Reading questions on the interwebs, most people get error messages when they use curl on th

Re: Nginx potentially leaking real filenames? (hopefully properly formatted)

2020-06-18 Thread lists
In theory not a problem, but look at the text on this page about placing root in location blocks. https://www.nginx.com/resources/wiki/start/topics/tutorials/config_pitfalls/ I saw your first post and thought it was entertaining. Somebody needs to annoy those hackers. Since I don't use php I tr

Re: Is this an attack or a normal request?

2020-08-24 Thread lists
I can't find it, but someone wrote a script to decode that style of hacking. For the hacks I was decoding, they were RDP hack attempts. The hackers just "spray" their attacks. Often they are not meaningful to your server. I have Nginx maps set up to match requests that are not relevant to my ser

Re: Is this an attack or a normal request?

2020-08-24 Thread lists
@nginx.org Reply-to: nginx@nginx.org Subject: Re: Is this an attack or a normal request? On Mon, 24 Aug 2020 11:54:35 -0700, lists wrote: <-snip-> > At a minimum I suggest blocking all Amazon AWS. No eyeballs there, > just hackers. Also block all of OVH. Great suggestions.  Also

Re: Is this an attack or a normal request?

2020-08-24 Thread lists
er-Agent header of web requests - both to understand who is trying to do what to your website, and then to start blocking on the basis of user agent. There may be some bots and spiders that are helpful or even necessary for your business. Peter > On Aug 24, 2020, at 2:54 PM, lists <li...@l

Unable to use subrequest authentication for proxied site

2020-09-19 Thread Lists
How do I configure nginx to use subrequest authentication for a reverse proxied application with websocket upgrades? The documentation doesn't seem to contain the information I need to do this. https://docs.nginx.com/nginx/admin-guide/security-controls/configuring-subrequest-authentication/ Wh

Re: Unable to use subrequest authentication for proxied site

2020-09-20 Thread Lists
See reply below On Sunday, September 20, 2020 8:29:32 AM PDT Francis Daly wrote: > On Sat, Sep 19, 2020 at 09:26:57AM -0700, Lists wrote: > > Hi there, > > > How do I configure nginx to use subrequest authentication for a reverse > > proxied application with

Re: Unable to use subrequest authentication for proxied site

2020-09-24 Thread Lists
Following up, after implementation and rollout. On Monday, September 21, 2020 1:52:32 AM PDT Francis Daly wrote: > That's probably the right thing to do overall; except that you probably > will not control what the typical browser shows for (e.g.) a 401 response. I've not seen that a 401 or what

Re: How to improve Nginx performance

2021-02-15 Thread lists
If you follow the suggested link in the previous post you can download an O'Reilly Nginx book. One suggestion I have to improve performance is to firewall off all the 'bots. Firewalls are extremely efficient. Start with AWS: https://docs.aws.amazon.com/general/latest/gr/aws-ip-ranges.html Bots

Re: Help request about Log4j attack attempts and NGINX logs meaning

2021-12-29 Thread lists
That IP space is certified shady. I detect the occasional hack from them. See  https://krebsonsecurity.com/2019/08/the-rise-of-bulletproof-residential-networks/ and https://wirelessdataspco.org/faq.php These wireless companies will do anything for money including leasing their IP space.  I do

Re: [EXTERNAL] Help request about Log4j attack attempts and NGINX logs meaning

2021-12-29 Thread lists
licking links, or following guidance. > >    Thank you very much for your reply. I really appreciated it. >    I’ll wait for the final gurus feedback too. > >    Mauro > >> On 29 Dec 2021, at 18:03, lists wrote: >> >> That IP space is certified shady. I dete

Re: Help request about Log4j attack attempts and NGINX logs meaning

2021-12-30 Thread lists
This is the list of effected programs. https://github.com/cisagov/log4j-affected-db/blob/develop/SOFTWARE-LIST.md   Original Message   From: ma...@nginx.com Sent: December 29, 2021 11:21 PM To: mauro.trid...@cmcc.it Reply-to: nginx@nginx.org Cc: nginx@nginx.org Subject: Re: Help

Re: Setting up a webDAV server

2022-01-01 Thread lists
Being that you are using Opensuse I think the answer is no but do you SELINUX enabled? Usually when a file permission doesn't solve the problem for me then it is some "policy" feature I don't know about. I do the file 777 permission during testing to debug something but I can't think of a case

Re: Obvious malware rejection module?

2022-02-14 Thread lists
hp and use the 444 return code which means return nothing. There are lists of shady user agents that you can block. By examining  my 404 returns I have made a map of typical hacker triggers to find in the URI. They get a 444 return. You can block wget and curl in the maps. Periodically I feed a

Re: Obvious malware rejection module?

2022-02-14 Thread lists
There are probably 50 common web crawlers. If they aren't Google, Apple, or Microsoft, I don't want them. The worst is one called "majestic 12". It seems to suck down the the entire website every visit. There are some that try to determine what ads your serve, of which I serve none. Another reads

Re: Obvious malware rejection module?

2022-02-14 Thread lists
lware rejection module? On Mon, Feb 14, 2022 at 6:17 PM lists <li...@lazygranch.com> wrote:...I have plenty of transit capacity. I can serve 3TB a month and I do 30GB. What I don't have is CPU power. I have a one CPU VPS. The CPU is shared resource. I think the RAM used by the VPS is more

Re: Nginx with OpenSSL 1.1.1n

2022-03-26 Thread lists
Isn't Openssl part of your OS?   Original Message   From: nginx-fo...@forum.nginx.org Sent: March 26, 2022 11:07 PM To: nginx@nginx.org Reply-to: nginx@nginx.org Subject: Nginx with OpenSSL 1.1.1n The Mainline version of Nginx i.e 1.12.6 has the OpenSSL version 1.1.1m and it i

Re: Certificate Error

2022-12-14 Thread lists
You can inspect the certificate at https://www.ssllabs.com/ssltest/ Maybe you will get lucky and it will help you find out what is wrong.   Original Message   From: softwareinfo...@gmail.com Sent: December 14, 2022 7:02 PM To: nginx@nginx.org Reply-to: nginx@nginx.org Subject:

Hierarchy of malformed requests and blocked IPs

2016-07-29 Thread lists
I see a fair amount of hacking attempts in the access.log. That is, they show up with a return code of 400 (malformed). Well yeah, they are certainly malformed. But when I add the offending IP address to my blocked list, they still show up as malformed upon subsequent readings of access.log. That

Re: Bash script; Was it executed?

2016-07-30 Thread lists
Thanks. I am patched for shellshock. The 200 return code through me off.   Original Message   From: Reinis Rozitis Sent: Saturday, July 30, 2016 12:21 PM To: nginx@nginx.org Reply To: nginx@nginx.org Subject: Re: Bash script; Was it executed? > I see a return code of 200. Does that mean this scr

ssl_trusted_certificate usage with parallel ECDSA / RSA certificates ?

2016-08-11 Thread lists
I've created 2 LetsEncrypt SSL certs -- an EC & and RSA. Following Support for parallel ECDSA / RSA certificates https://trac.nginx.org/nginx/ticket/814 I config ssl_certificate "/etc/letsencrypt/live/example.com/fullchain.ec.pem"; ssl_certificate_key

Re: Problems with custom log file format

2016-08-23 Thread lists
Looks like I have no takers on this problem. Should I filed a bug report? If so, where?   Original Message   From: li...@lazygranch.com Sent: Sunday, August 21, 2016 7:02 PM To: nginx@nginx.org Reply To: nginx@nginx.org Subject: Problems with custom log file format Nginx 1.10.1,2 FreeBSD 10.2-

Re: Problems with custom log file format

2016-08-23 Thread lists
Configuration file included in the post. I already checked it.   Original Message   From: Maxim Dounin Sent: Tuesday, August 23, 2016 10:10 AM To: nginx@nginx.org Reply To: nginx@nginx.org Subject: Re: Problems with custom log file format Hello! On Tue, Aug 23, 2016 at 10:07:56AM -0700, li...@l

Re: Problems with custom log file format

2016-08-23 Thread lists
Thanks. I will fix the line and report back.  I'm not really using the xyz tld. The lines should be commented out. I'm just using the com. But I will check that as well   Original Message   From: Reinis Rozitis Sent: Tuesday, August 23, 2016 1:32 PM To: nginx@nginx.org Reply To: nginx@nginx.org

Re: limit-req and greedy UAs

2016-09-08 Thread lists
‎Since this limit is per IP, is the scenario you stated really a problem? Only that IP is effected. Or as is often the case, did I miss something? http://nginx.org/en/docs/http/ngx_http_limit_req_module.html   Original Message   From: Grant Sent: Thursday, September 8, 2016 6:24 PM To: nginx@ngi

Re: limit-req and greedy UAs

2016-09-09 Thread lists
‎But again, if you have a particular IP behaving badly, and limiting for that IP kicks in, I say they get what they deserve. The goal of limiting resources to one particular IP is to prevent other users from havin

Re: limit-req and greedy UAs

2016-09-11 Thread lists
I suspect you are referring to the countless variations on the favicon, with Apple being the worst offender since they have many "touch" files. Android has them too. Just make the files. They don't have to be works of art.  http://iconifier.net/ One of many generators. Clearly Apple has no resp

Re: limit-req and greedy UAs

2016-09-11 Thread lists
‎This page has all the secret sauce, including how to limit the number of connections.  https://www.nginx.com/blog/mitigating-ddos-attacks-with-nginx-and-nginx-plus/ I set up the firewall with a higher number as a "just in case." Also note if you do streaming outside nginx, then you have to lim

Re: limit-req and greedy UAs

2016-09-11 Thread lists
‎https://www.nginx.com/blog/tuning-nginx/ ‎I have far more faith in this write up regarding tuning than the anti-ddos, though both have similarities.  My interpretation is the user bandwidth is connections times rate. But you can't limit the connection to one because (again my interpretation) t

Re: limit-req and greedy UAs

2016-09-12 Thread lists
‎I picked 444 based on the following, though I see your point in that it is a non-standard code. I guess from a multiplier standpoint, returning nothing is as minimal as it gets, but the hacker often sends the message twice due to lack of response. A 304 return to an attempt to log into WordPres

Re: limit-req and greedy UAs

2016-09-12 Thread lists
Most of the chatter on the interwebs believes that the rate limit is per connection, so if some IP opens up multiple connections, they get more bandwidth.  It shouldn't be that hard to just test this by installing a manager and seeing what happens. I will give this a try tonight, but hopefully

Re: limit-req and greedy UAs

2016-09-13 Thread lists
‎Re-reading the  original post, it was concluded that multiple connection don't effect the rate limiting. I interpreted this incorrectly the first time: ‎ "Nginx's limit_rate function limits the data transfer rate of a single connection.‎" But I'm certain a few posts, perhaps not on the nginx for

Re: Keeping your Nginx limit_* Anti-DDoS behind CloudFlare's servers

2016-09-13 Thread lists
‎What about Roboo? It requires a cookie on the website before the download takes place. (My usual warning this is my understanding of how it works, but I have no first hand knowledge.) I presume the hot linkers won't have the cookie. https://github.com/yuri-gushin/Roboo   Original Message   Fro

Re: Keeping your Nginx limit_* Anti-DDoS behind CloudFlare's servers

2016-09-13 Thread lists
‎I'm assuming at this point if cookies are too much, then logins or captcha aren't going to happen.  How about just blocking the offending websites at the firewall? I'm assuming you see the proxy and not the eyeballs at the ISP.  I have my hacker detection schemes in nginx. I flag the clowns, y

(Semi-OT) Clickjacking countermeasure

2016-09-22 Thread lists
I ran one of these website inspection services on my website and it was deemed to be subject to Clickjacking. This might be a false positive since I don't use frames, but the info on this link was enough to make the error go away. I chose "DENY" since I don't use frames.  https://geekflare.com/

Re: (Semi-OT) Clickjacking countermeasure

2016-09-22 Thread lists
I saw that, but I took the path of least resistance. The method I mentioned was sufficient  to pass the tinfoilsecurity.com test. To tinfoils's credit, they provided three references on Clickjacking, one of which is the website you suggested.   Original Message   From: c0nw0nk Sent: Thursday, S

Re: (Semi-OT) Clickjacking countermeasure

2016-09-22 Thread lists
I serve no ads. I even pulled my piwik so that my sites can be surfed no script.  Can you clickjack an encrypted page? How would the browser handle two certs?   Original Message   From: c0nw0nk Sent: Thursday, September 22, 2016 1:57 PM To: nginx@nginx.org Reply To: nginx@nginx.org Subject: Re:

Re: performance hit in using too many if's

2016-09-24 Thread lists
‎I suspect the map module can do that more efficiently. There is an example of how to use the map module in this post: http://ask.xmodulo.com/block-specific-user-agents-nginx-web-server.html The code is certainly cleaner using map. I use three maps, specifically for   bad user agent, bad request

Re: performance hit in using too many if's

2016-09-24 Thread lists
Possibly map uses a hashing scheme to do the matches, so it could be more efficient than a series of ifs. That is something the programmers would know.  Every situation is different. I don't find the maps I use to be detrimental, especially if you are preventing further operations by the nginx.

Re: performance hit in using too many if's

2016-09-24 Thread lists
I had too many false positives with Naxsi and debugging is difficult. In any event, using Naxsi doesn't eliminate the need to block bad referrals, so you still need the map module.   I have passed tinfoilsecurity.com flogging, as well as one of the transversal testers. So this is more than just

Re: fake googlebots

2016-09-25 Thread lists
That looks promising. BTW most Google Image bots are fake. But I don't allow hot linking. A legitimate Google user viewing the reduced resolution image provided by Google can click to see the referring page, so no

Re: fake googlebots / nginx-http-rdns

2016-09-26 Thread lists
I doubt I could patch source. (I know my limits.) But reverse DNS seems very useful. Someone should fix the module.   Original Message   From: A. Schulze Sent: Monday, September 26, 2016 12:33 AM To: nginx@nginx.org Reply To: nginx@nginx.org Subject: Re: fake googlebots / nginx-http-rdns lists

Re: performance hit in using too many if's

2016-09-26 Thread lists
For one thing, I have trouble making fail2ban work. ;-)  I run sshguard, so the major port 22 hacking is covered. And that is continous. I don't know if fail2ban can read nginx logs. I thought you need to run swatch, which requires actual perl skill to set up. In any event, my 444 is harmless o

Re: performance hit in using too many if's

2016-09-26 Thread lists
I'm not sure the number of virtual hosts matters since each attack is individual. But if 500 vhosts meant say a hundred customers, I sure wouldn't want to deal with the false positives in your email. Much like set

Re: performance hit in using too many if's

2016-09-26 Thread lists
You might want to check out tinfoilsecurity.com to evaluate Naxsi. Microsoft uses them for azure.  I pass all their tests.  As I stated a few times, I only serve static pages. I can get away with homebrew hacking detection. But I think you are kidding yourself if you think a stack of WAF rules

444 return code and rate limiting

2016-09-27 Thread lists
I pulled this off the rate limiting thread since I think the 444 return is a good topic all on its own. "But under a DoS attack I always feel those values would be better being "444" since the server won't respond and cut's the connection rather than waste bandwidth on a client who is opening and

Re: 444 return code and rate limiting

2016-09-27 Thread lists
‎Your reply does not agree with the documentation.  ‎https://httpstatuses.com/444 ‎   Original Message   From: B.R. Sent: Tuesday, September 27, 2016 10:09 AM To: nginx ML Reply To: nginx@nginx.org Subject: Re: 444 return code and rate limiting Responding 444 is... a response. It is not anything

Re: 444 return code and rate limiting

2016-09-27 Thread lists
If you dig through some old posts, it was established that the deny feature of nginx isn't very effective at limiting‎ network activity. I deny at the firewall.  What remains is if you should deny dynamically or statically. ‎   Original Message   From: c0nw0nk Sent: Tuesday, September 27, 2016

Re: 444 return code and rate limiting

2016-09-28 Thread lists
If you just reply to these hackers, you will be "pinged" until oblivion. I choose to fight, you don't. I have a different philosophy. I log the offenders and if from a colo, VPS, etc., they can enjoy their lifetim

Re: 444 return code and rate limiting

2016-09-28 Thread lists
I don't do 444 for rate limiting. I figure a hacker doesn't deserve a response. I see the occasional double request, but not 10. Most likely the entity trying to log into my WordPress control panel  is not typing

nginx 1.11.5 'duplicate' map_hash_bucket_size error when geoip_country block used?

2016-10-22 Thread lists
I have a working nginx/1.11.5 instance, with this in config ... http( ... 134 map_hash_bucket_size 4096; ... ) ... when I add geoip blocking ...

Re: nginx 1.11.5 'duplicate' map_hash_bucket_size error when geoip_country block used?

2016-10-22 Thread lists
On Sat, Oct 22, 2016, at 09:42 AM, itpp2012 wrote: > Syntax: map_hash_bucket_size size; > Default: map_hash_bucket_size 32|64|128; > Context: http > > The err message is valid but may be misleading due to the places you used, a > dup msg does not indicate the valid context area.

Re: nginx 1.11.5 'duplicate' map_hash_bucket_size error when geoip_country block used?

2016-10-24 Thread lists
On Mon, Oct 24, 2016, at 05:20 AM, Maxim Dounin wrote: > It's not relevant to geoip_country, but rather to the map{} block > before the map_hash_bucket_size directive. Something like > > map $uri $foo {} > map_hash_bucket_size 4096; > > is enough to trigger the error, as the map{} block

Re: Blocking tens of thousands of IP's

2016-11-01 Thread lists
‎   Original Message   From: Cox, Eric S Sent: Tuesday, November 1, 2016 8:16 AM To: nginx@nginx.org Reply To: nginx@nginx.org Subject: Blocking tens of thousands of IP's Is anyone aware of a difference performance wise between using   return 403;   vs   deny all;   When mapping against a list of

Re: Blocking tens of thousands of IP's

2016-11-01 Thread lists
‎   Original Message   From: Cox, Eric S Sent: Tuesday, November 1, 2016 3:35 PM To: nginx@nginx.org Reply To: nginx@nginx.org Subject: RE: Blocking tens of thousands of IP's Currently we track all access logs realtime via an in house built log aggregation solution. Various algorithms are setup

Re: Blocking tens of thousands of IP's

2016-11-01 Thread lists
If you get hammered, even serving the 403-page is actually noticeable traffic. - Nginx rate limiting works very well. ‎ ___ nginx mailing list nginx@nginx.org http://mailman.nginx.org/mailman/listinfo/nginx

Re: Nginx Kodi User Agent secure_link blocking / banning

2016-11-02 Thread lists
Kodi is the renamed xbmc. I use it myself, but I never "aimed" it at a website. I just view my own videos or use the kodi plug-ins. You can install it yourself on a PC and see it is intended to be just a media player. It really isn't any different that seeing VLC as the agent.  Perhaps someone

Re: Nginx Kodi User Agent secure_link blocking / banning

2016-11-02 Thread lists
‎Apparently there is a scheme to feed urls to kodi.  ‎https://m.reddit.com/r/kodi/comments/3lz84g/how_do_you_open_a_youtube_video_from_the_shell/ Block/ban as you see fit. ;-) These people are edge users of Kodi.  But you may want to search the interwebs to see if someone is attempting to write

Re: Nginx Kodi User Agent secure_link blocking / banning

2016-11-02 Thread lists
I don't know how to state this without being insulting, but Kodi is designed to be used by dumb people. That is how I use it. It seems pointless to me to try to hack Kodi into doing something it wasn't meant to do. That is why I called that example an edge case.  There is a YouTube plugin for K

Re: Blocking tens of thousands of IP's

2016-11-08 Thread lists
Is that 2.2 million CIDRs, or actual addresses? I use IPFW with tables for about 20k CIDRs. I don't see any significant server load. It seems to me nginx has a big enough task that it makes sense to offload the blocking to something that is more tightly integrated to the OS.  At a bare minimum,

Re: Unexptected return code

2016-11-09 Thread lists
‎Makes perfect sense!  ‎   Original Message   From: Maxim Dounin Sent: Wednesday, November 9, 2016 2:02 AM To: nginx@nginx.org Reply To: nginx@nginx.org Subject: Re: Unexptected return code Hello! On Tue, Nov 08, 2016 at 11:27:36PM -0800, li...@lazygranch.com wrote: > I only serve static pages,

Re: Bloking Bad bots

2016-11-14 Thread lists
You can block some of those bots at the firewall permanently.   I use the nginx map feature in a similar manner, but I don't know if map is more efficient than your code. ‎I started out blocking similar to your scheme, but the map feature looks clear to me in the conf file. Majestic and Sogou s

Re: Bloking Bad bots

2016-11-14 Thread lists
I'd be shocked if the map function doesn't use a smart search scheme rather than check every item.  

Re: Bloking Bad bots

2016-11-14 Thread lists
fwiw, I use the map approach discussed here. I've a list of a hundred or so 'bad bots'. I reply with a 444. Screw 'em. IMO, the performance hit of blocking them is far less than the performance havoc they wreak if allowed to (try to) scan your site, &/or the inevitable flood of crap from you

Re: Bloking Bad bots

2016-11-14 Thread lists
Comparing strings is CS101. If map is a  linear search, that should be something to improve.I'm assuming you read the code 

Re: Is this a valid request?

2016-11-15 Thread lists
The is nothing in my html that would generate that request, though the web page address is perfectly valid. I thought it be some IOS thing. ‎You know all the stuff safari generates. I'm going to ignore it. I haven

Re: Bloking Bad bots

2016-11-15 Thread lists
I find Naxsi hard to debug. For me, it generated many false positives. YMMV

Re: limit_req per subnet?

2016-12-13 Thread lists
That attack wasn't very distributed. ;-) Did you see if the IPs were from an ISP? If not, I'd ban the service using the Hurricane Electric BGP as a guide.  At a minimum, you should be blocking the major cloud services, especially OVH. They offer free trial accounts, so of course the hackers abu

Re: limit_req per subnet?

2016-12-14 Thread lists
‎They claim to obey robots.txt. They also claim to to use consecutive IP addresses. https://www.semrush.com/bot/ ‎ Some dated posts (2011) indicate semrush uses AWS. I block all of AWS IP space and can say I've never seen a semrush bot. So that might be a solution. I got the AWS IP space from s

Re: limit_req per subnet?

2016-12-14 Thread lists
I'm no fail2ban guru. Trust me. I'd suggest going on serverfault. But my other post indicates semrush resides on AWS, so just block AWS. I doubt there is any harm in blocking AWS since no major search engine uses them.  Regarding search engines, the reality is only Google matters. Just look at y

Re: limit_req per subnet?

2016-12-14 Thread lists
By the time you get to UA, nginx has done a lot of work.  You could 444 based on UA, then read that code in the log file with fail2ban or a clever script. ‎That way you can block them at the firewall. It won't help immediately with the sequential number, but that really won't be a problem.   

Re: limit_req per subnet?

2016-12-15 Thread lists
This is an interesting bit of code. However if you are being ddos-ed, this just eliminates nginx from replying. It isn't like nginx is isolated from the attack. I would still rather block the IP at the firewall and prevent nginx fr‎om doing any action.  The use of $bot_agent opens up a lot of p

Re: limit_req per subnet?

2016-12-15 Thread lists
Here is my philosophy. A packet arrives at your server. This can be broken down into two parts: who are you and what do you want. The firewall does a fine job of stopping the hacker at the who are you point.  When the packet reaches Nginx, the what do you want part comes into play. Most likely

Re: nginx.conf

2016-12-15 Thread lists
‎Take a look at this: ‎http://ask.xmodulo.com/block-specific-user-agents-nginx-web-server.html Personally, I would use the map feature since eventually there will be other user agents to block. I use three maps. I block based on requests, referrals, and ‎user agents. The user agent is kind of o

Re: nginx.conf

2016-12-16 Thread lists
Are you trying to block baiduspider from your html email?  I think you should review the commented out lines. Very old school, but you may want to just print your conf file and line up curly braces. Perhaps copy the conf file, delete commented lines, and then see if it makes sense.  It looks to

Re: Performance test caps at 600 Mbit/s

2017-01-09 Thread lists
‎FYI, benchmark mentioned in the video. https://github.com/wg/wrk Wouldn't a number of test machine ls on the Internet make more sense than flogging nginx locally on your network? With VPS time being sold by the hour, seems to me you should get one VPS tester running acceptably, then clone a do

Re: Limit number of connections to server

2017-04-04 Thread lists
You would probably want to also limit the number of connections per IP address, else one IP could lock up the entire site.   Original Message   From: Valentin V. Bartenev Sent: Tuesday, April 4, 2017 1:58 PM To: nginx@nginx.org Reply To: nginx@nginx.org Subject: Re: Limit number of connections t

Re: How to restrict acces to specific friendly URL by IP in Wordpress site?

2017-05-19 Thread lists
‎ My experience with deny in nginx is the url isn't hidden. That is I think a crawler will see the "secret" location. Can you set this up for the 444 code, that is no reply?Rethinking this, I suppose if the webser

Re: How to restrict acces to specific friendly URL by IP in Wordpress site?

2017-05-19 Thread lists
‎I've used this for traversal tests, but my experience is the false positive rate is very high. I ended up writing some rules to filter the test.

Re: How to restrict acces to specific friendly URL by IP in Wordpress site?

2017-05-19 Thread lists
Beats me. I thought the 404 is what you get with the deny access. I'm sure my nginx skills are worse than yours. ;-)At one time I had a long list of deny addresses on nginx, but nginx does some processing before f

Re: How to restrict acces to specific friendly URL by IP in Wordpress site?

2017-05-19 Thread lists
I would return nothing, that is the 444 code. I have scripts that process access.log for 444, then see if they come from locations without eyeballs such as data centers, VPS, etc. The entire IP space then goes in

  1   2   >