Karthik Nanjangude wrote:
> Hi
> 
> SPEC ( Single box)
> O/s : Unix 11
> J2sdk  : 1.6
> DB : Oracle10g
> TOMCAT 6.0.18.0
> RAM  16 GB
> 
> 
> 
> A normal WEB application [ User id / Passwd for AAA ] on the following spec  
> is successfully running LIVE  [  non  clustered mode  ]
> 
> Question :  Some hacker is trying to bring the System down by polling the 
> sending continuous  HTTP request  very frequently [ We logged the client IP  
> address],
>                  The WEB application cannot be configured to HTTPS (Client 
> disapproval)
>                  Is there any way within tomcat design to prevent the same 
> from malicious attack?

You can limit the impact on Tomcat by blocking them with a Remote Address
Filter (http://tomcat.apache.org/tomcat-6.0-doc/config/valve.html)

However, the earlier you can block them the better. If you can block that
IP at a firewall before they get to your box that would be better. Failing
that block the IP with iptables (or the equivalent on your platform) on the
server.

HTH,

Mark


---------------------------------------------------------------------
To start a new topic, e-mail: users@tomcat.apache.org
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to