Hi gurus,
We have 2 servers.
Server1 has a apache.
Server2 has a tomcat.
Now we see there are many syn recv connection via "netstat -ant".
These kinds of connection are running out the CPU.
We googled it and found it looks like of syn recv attack.
So I just want to know:
1. How to verify it DOE
>On Wed, Jul 15, 2015 at 12:32 PM, javalishixml wrote:
>> RewriteCond %{REQUEST_URI} ^/myjco/mySecurity
>
>
>You probably meant to negate this one, specifically to avoid the loop?
>
>--
>Eric Covener
>cove...@gmail.com
>
>-
Hi Gurus,
Just a silly question this is. But I really suffer it too much ... :(
I'm using rewrite module to do rewrite url. I made below rule:
RewriteCond %{SERVER_PORT} !^443$
RewriteCond %{HTTP_HOST} ^www.jco.com.cn$
RewriteCond %{REQUEST_URI} ^/myjco/mySecurity
RewriteRule (.*) https:/
e again and again.
Is it a DDOS attack? Is there a good way to resolve it at httpd level? Which
apache mod is best for my issue?
在 2015-05-20 05:11:13,"Kurtis Rader" 写道:
On Tue, May 19, 2015 at 8:22 AM, javalishixml wrote:
I see you speak "Though those modules exist, this m
tipconn2.html
Though those modules exist, this might be best implemented in your application.
Another way to do it would be with a log parsing tool like Fail2Ban.
- Y
On Tue, May 19, 2015 at 4:29 AM, javalishixml wrote:
Hi,
I have a website. It is built by apache + tomcat.
Now we make a
Hi,
I have a website. It is built by apache + tomcat.
Now we make a lottery activity at this website. But we find that some robots
always raise the duplicated requests to hit this lottery activity. It causes
that robots almost get all the awards.
So we just want to block these kind of duplicat