Mark Thomas wrote:
Karthik Nanjangude wrote:
Hi

SPEC ( Single box)
O/s : Unix 11
J2sdk  : 1.6
DB : Oracle10g
TOMCAT 6.0.18.0
RAM  16 GB



A normal WEB application [ User id / Passwd for AAA ] on the following spec  is 
successfully running LIVE  [  non  clustered mode  ]

Question :  Some hacker is trying to bring the System down by polling the 
sending continuous  HTTP request  very frequently [ We logged the client IP  
address],
                 The WEB application cannot be configured to HTTPS (Client 
disapproval)
                 Is there any way within tomcat design to prevent the same from 
malicious attack?

You can limit the impact on Tomcat by blocking them with a Remote Address
Filter (http://tomcat.apache.org/tomcat-6.0-doc/config/valve.html)

However, the earlier you can block them the better. If you can block that
IP at a firewall before they get to your box that would be better. Failing
that block the IP with iptables (or the equivalent on your platform) on the
server.

HTH,

Mark
Mark is right. In any case, SSL wouldn't even slow this kind of attack down; it's only encryption....not authentication. SSL will actually make it slightly worse since Tomcat has to work harder to decrypt and encrypt the traffic. Filtering by IP is a good solution here, but if this is your first publicly exposed website be prepared: This happens all the time, and the client IP's will be wildly different...you can't possibly filter them all. You might consider a good IPS between you and the Internet at large. One example of a good free solution is Untangle. You can buy support as well if it makes you more comfortable. There's also dedicated "appliances" for this as well.

Brantley


---------------------------------------------------------------------
To start a new topic, e-mail: users@tomcat.apache.org
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to