Hi Barry,

I had the same issue a few months ago with various apps (Tapestry and non
Tapestry ones).
If you've got an Apache front-end, have a look at fail2ban (
http://www.fail2ban.org).
It basically scans your error_log and based on typical attacks forbids the
attacker IP to request your apps, by altering the firewall configuration.

IHTH,
Jérôme.

On Tue, Feb 21, 2012 at 21:26, trsvax <trs...@gmail.com> wrote:

> I've got people running vulnerability scanners against a production site.
> I've also got log4j configured to send email exceptions to me and
> unfortunately this means I get a lot of email. For example the scanner
> requests /index.php~
>
> which results in the following log:
>
>
> 2012-02-21 14:17:37,324 [ajp-bio-8009-exec-48] [ERROR]
> TapestryModule.RequestExceptionHandler Processing of request failed with
> uncaught exception: Input string  'index.php~' is not valid; the character
> '~' at position 10 is not valid.
>
> Which results in a email to me.
>
> I realize I could stop this with some log4j config but what I'd rather do
> is
> just stop all this traffic before it even gets that far. Perhaps if you get
> more than 10 exceptions in a minute blacklist your IP. Has anyone done
> anything like that or have other suggestions?
>
> Thanks
> Barry
>
>
> --
> View this message in context:
> http://tapestry.1045711.n5.nabble.com/Vulnerability-Scanners-tp5503278p5503278.html
> Sent from the Tapestry - User mailing list archive at Nabble.com.
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@tapestry.apache.org
> For additional commands, e-mail: users-h...@tapestry.apache.org
>
>


-- 
Jerome Bernard,
Blog: http://jerome-bernard.com

Reply via email to