[NLUUG]   Welcome to ftp.nluug.nl
Current directory: /os/Linux/distr/salix/sbo/14.1/network/mod_evasive/
 
Current bandwidth utilization 1460.95 Mbit/s
Bandwidth utilization bar
Contents of README:
mod_evasive maneuvers module for Apache to provide evasive action in the event
of an HTTP DoS or DDoS attack or brute force attack. It is also designed
to be a detection and network management tool, and can be easily configured
to talk to ipchains, firewalls, routers, and etcetera. mod_evasive presently
reports abuses via email and syslog facilities.

Detection is performed by creating an internal dynamic hash table of IP
Addresses and URIs, and denying any single IP address from any of the
following:
    * Requesting the same page more than a few times per second
    * Making more than 50 concurrent requests on the same child per second
    * Making any requests while temporarily blacklisted (on a blocking list)

You'll need to add the following line to your /etc/httpd/httpd.conf file:
  Include /etc/httpd/extra/mod_evasive.conf

To test enter the following command:
  perl /usr/doc/mod_evasive-$VERSION/test.pl | more
which should output some HTTP/1.1 200 OK lines; then HTTP/1.1 403 Forbidden

mod_evasive is fully tweakable through the Apache configuration file, see
the README file in the package's documentation directory.

Icon  Name                                    Last modified      Size  
[DIR] Parent Directory - [TXT] README 26-Nov-2013 10:57 1.1K [   ] doinst.sh 26-Nov-2013 10:57 612 [TXT] fixup-for-httpd24.diff 29-Sep-2012 06:34 3.6K [   ] mod_evasive.SlackBuild 26-Nov-2013 10:57 2.3K [   ] mod_evasive.conf 26-Nov-2013 10:57 307 [   ] mod_evasive.info 26-Nov-2013 10:57 337 [TXT] slack-desc 26-Nov-2013 10:57 873

NLUUG - Open Systems. Open Standards
Become a member and get discounts on conferences and more, see the NLUUG website!