Re: [users@httpd] Re: apache service interruption

2013-08-02 Thread Pete Houston
On Thu, Aug 01, 2013 at 10:49:59PM -0700, Grant wrote: > Do you do this only when under DoS attack or all the time? All the time. > Won't you potentially prevent legitimate users from making a single > connection if they're connecting with a shared IP from a university > campus (for example)? Ye

Re: [users@httpd] Re: apache service interruption

2013-08-01 Thread Michael D. Wood
You could potentially deny legitimate users access. I limit so many connections per second per source IP. If I knew I were getting a ton of traffic from a University I would have to adjust it accordingly. The setting in pfsense is Maximum new connections / per second(s) - that's per IP. My

Re: [users@httpd] Re: apache service interruption

2013-08-01 Thread Grant
> Truthfully, I've always limited connections from the source IP via a > firewall before the traffic is even passed to apache. Do you do this only when under DoS attack or all the time? Won't you potentially prevent legitimate users from making a single connection if they're connecting with a sha

Re: [users@httpd] Re: apache service interruption

2013-08-01 Thread Michael D. Wood
Truthfully, I've always limited connections from the source IP via a firewall before the traffic is even passed to apache. On 08/01/2013 04:39 AM, Grant wrote: Two different things come to mind. Kingcope found an Apache byterange vulnerability and the PoC code he wrote for it exhausts the res

Re: [users@httpd] Re: apache service interruption

2013-08-01 Thread Grant
> Two different things come to mind. Kingcope found an Apache byterange > vulnerability and the PoC code he wrote for it exhausts the resources on a > server running Apache. Only 1 instance of his perl script had to be ran. > LOIC is another that could possible DoS your server from one source. W

Re: [users@httpd] Re: apache service interruption

2013-08-01 Thread Grant
>> ModSecurity looks good and I think it works with nginx as well as >> apache. Is everyone who isn't running OSSEC HIDS or ModSecurity >> vulnerable to a single client requesting too many pages and >> interrupting the service? > > Not everyone, no. There are other alternatives such as mod_limitip

Re: [users@httpd] Re: apache service interruption

2013-07-30 Thread Pete Houston
On Mon, Jul 29, 2013 at 11:25:26PM -0700, Grant wrote: > ModSecurity looks good and I think it works with nginx as well as > apache. Is everyone who isn't running OSSEC HIDS or ModSecurity > vulnerable to a single client requesting too many pages and > interrupting the service? Not everyone, no.

Re: [users@httpd] Re: apache service interruption

2013-07-29 Thread Michael D. Wood
Two different things come to mind. Kingcope found an Apache byterange vulnerability and the PoC code he wrote for it exhausts the resources on a server running Apache. Only 1 instance of his perl script had to be ran. LOIC is another that could possible DoS your server from one source. What

Re: [users@httpd] Re: apache service interruption

2013-07-29 Thread Grant
> You wouldn't keep a syn proxy rule enabled all the time; only under a DoS > attack. You could also implement ModSecurity. ModSecurity looks good and I think it works with nginx as well as apache. Is everyone who isn't running OSSEC HIDS or ModSecurity vulnerable to a single client requesting t

Re: [users@httpd] Re: apache service interruption

2013-07-29 Thread Michael D. Wood
You wouldn't keep a syn proxy rule enabled all the time; only under a DoS attack. You could also implement ModSecurity. On 07/29/2013 02:07 PM, Grant wrote: Also, you should be able to limit simultaneous client connections with your firewall and pass the traffic in a syn proxy state. There are

Re: [users@httpd] Re: apache service interruption

2013-07-29 Thread Grant
> Also, you should be able to limit simultaneous client connections with your > firewall and pass the traffic in a syn proxy state. There are numerous ways > to achieve this. Is that the best way to go besides OSSEC HIDS? I can imagine that sort of thing could cause problems. - Grant >> You ca

Re: [users@httpd] Re: apache service interruption

2013-07-29 Thread Grant
> You can always compile from source ;) > What version of Apache are you running? I'm running 2.2.25. - Grant >>> Was it just an IP exhausting the apache service with too many >>> connections? What do you see in the access logs? I use OSSEC HIDS on my >>> apache servers to mitigate this. >> >

Re: [users@httpd] Re: apache service interruption

2013-07-29 Thread Michael D. Wood
Also, you should be able to limit simultaneous client connections with your firewall and pass the traffic in a syn proxy state. There are numerous ways to achieve this. On 07/29/2013 03:18 AM, Michael D. Wood wrote: You can always compile from source ;) What version of Apache are you running?

Re: [users@httpd] Re: apache service interruption

2013-07-29 Thread Michael D. Wood
You can always compile from source ;) What version of Apache are you running? On 07/29/2013 02:59 AM, Grant wrote: Was it just an IP exhausting the apache service with too many connections? What do you see in the access logs? I use OSSEC HIDS on my apache servers to mitigate this. In the ac

Re: [users@httpd] Re: apache service interruption

2013-07-29 Thread Grant
> Was it just an IP exhausting the apache service with too many connections? > What do you see in the access logs? I use OSSEC HIDS on my apache servers to > mitigate this. In the access log I see the same IP made many requests during the service interruption and I think that exhausted the apa

Re: [users@httpd] Re: apache service interruption

2013-07-27 Thread Michael D. Wood
Was it just an IP exhausting the apache service with too many connections? What do you see in the access logs? I use OSSEC HIDS on my apache servers to mitigate this. -- Sent from my mobile device Michael D. Wood www.itsecuritypros.org Grant wrote: >> My server has 4GB RAM and uses nginx as

[users@httpd] Re: apache service interruption

2013-07-27 Thread Grant
> My server has 4GB RAM and uses nginx as a reverse proxy to apache. A > little while ago my website became inaccessible for about 30 minutes. > I checked my munin graphs and it looks like apache processes spiked to > about 29 during this time which is many times greater than usual. I > have MaxC