Re: [squid-users] Detecting clients flooding squid with failed request

2015-08-03 Thread Eliezer Croitoru
Hey Dan, It's pretty simple to write this rule since its a counted+pattern match and that's it nothing more. If it fits your need you can add a send mail target instead of a "ban" one. Eliezer On 03/08/2015 10:25, Dan Charlesworth wrote: Thanks Antony. Fail2ban looks like a viable option th

Re: [squid-users] Detecting clients flooding squid with failed request

2015-08-03 Thread Dan Charlesworth
Thanks Antony. Fail2ban looks like a viable option though we would still need to write a regex definition to target this sort of behaviour. Their squid example targets aggressive hosts where my preference would be to target aggressive applications (that could be running on more than one host).

Re: [squid-users] Detecting clients flooding squid with failed request

2015-08-03 Thread Antony Stone
On Monday 03 August 2015 at 08:06:35 (EU time), Dan Charlesworth wrote: > Probably a lot of forward proxy users here have encountered applications > which, if they can’t get their web requests through the proxy (because of > 407 Proxy Auth Required or whatever), just start aggressively, endlessly

[squid-users] Detecting clients flooding squid with failed request

2015-08-02 Thread Dan Charlesworth
Probably a lot of forward proxy users here have encountered applications which, if they can’t get their web requests through the proxy (because of 407 Proxy Auth Required or whatever), just start aggressively, endlessly spamming requests. A recent example would be AVG’s “cloud” features generat