Christopher,
there are several questions in the same thread.. The first one about
SlowLoris was answered a long ago (
http://tomcat.10.x6.nabble.com/is-tomcat-6-0-35-vulnerable-to-CVE-2007-6750-td585.html
). On the contrary, for fast connections opening (DOS), we can
configure the firewall in
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Aurélien,
On 3/16/15 9:16 AM, Aurélien Terrestris wrote:
> As browsers (at least the ones I know) open 2 connections to
> browse websites
That number has been bigger than 2 for quite a while, now:
http://stackoverflow.com/questions/985431/max-para
As browsers (at least the ones I know) open 2 connections to browse
websites, we could have a look on the hourly stats and estimate this
(under 100 without problem). I never met such problem anyway, the
highest trafic being 120 000 different users/day.
If you really have to face DDOS as said by Ch
On 3/16/2015 8:41 AM, Robert Klemme wrote:
On Sun, Mar 15, 2015 at 10:07 AM, Aurélien Terrestris
wrote:
I agree with the NIO connector which gives good results to this
problem. Also, on Linux you can configure iptables firewall to limit
the number of connections from one IP (
http://unix.sta
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Robert,
On 3/16/15 8:41 AM, Robert Klemme wrote:
> On Sun, Mar 15, 2015 at 10:07 AM, Aurélien Terrestris
> > wrote:
>
>> I agree with the NIO connector which gives good results to this
>> problem. Also, on Linux you can configure iptables firewall
On Sun, Mar 15, 2015 at 10:07 AM, Aurélien Terrestris wrote:
> I agree with the NIO connector which gives good results to this
> problem. Also, on Linux you can configure iptables firewall to limit
> the number of connections from one IP (
>
> http://unix.stackexchange.com/questions/139285/limit-
ek wrote:
>> Hello,
>>
>> our webapp, that is deployed in Tomcat 8.0.18, was tested positive
>> as vulnerable to the slow http denial of service: "By using a
>> single computer, it is possible to establish thousands of
>> simultaneous connections and keep them
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Petr,
On 3/14/15 3:32 PM, Petr Nemecek wrote:
> Hello,
>
> our webapp, that is deployed in Tomcat 8.0.18, was tested positive
> as vulnerable to the slow http denial of service: "By using a
> single computer, it is possible to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 3/14/2015 12:32 PM, Petr Nemecek wrote:
> Hello,
>
> our webapp, that is deployed in Tomcat 8.0.18, was tested positive
> as vulnerable to the slow http denial of service: "By using a
> single computer, it is possible to es
Hello,
our webapp, that is deployed in Tomcat 8.0.18, was tested positive as
vulnerable to the slow http denial of service: "By using a single computer,
it is possible to establish thousands of simultaneous connections and keep
them open for a long time. During the attack, the server was ren
10 matches
Mail list logo