Groups | Search | Server Info | Keyboard shortcuts | Login | Register [http] [https] [nntp] [nntps]
Groups > comp.os.linux.security > #311
| From | David Hough <noone$$@llondel.org> |
|---|---|
| Organization | the bus stop |
| Date | 2013-05-24 19:42 +0100 |
| Subject | Re: Blocking client based on HTTP request |
| Newsgroups | comp.os.linux.networking, comp.os.linux.security, comp.infosystems.www.servers.unix |
| References | <mr-CA16B8.15073524052013@News.Individual.NET> |
| Followup-To | comp.os.linux.security |
| Message-ID | <bto47a-45c.ln1@llondel.org> (permalink) |
Cross-posted to 3 groups.
Followups directed to: comp.os.linux.security
Sandman wrote: > So, as my other thread may suggest, I have problems with users flooding > my server with requests for /wpad.dat > > Is there an easy way to use iptables to trigger on those requests and > then add the IP to a blacklist? > Try fail2ban <http://www.fail2ban.org> as one possible candidate. I've not yet tried to use it but it's on my to-do list. Dave
Back to comp.os.linux.security | Previous | Next — Previous in thread | Next in thread | Find similar
Blocking client based on HTTP request Sandman <mr@sandman.net> - 2013-05-24 15:07 +0200
Re: Blocking client based on HTTP request David Hough <noone$$@llondel.org> - 2013-05-24 19:42 +0100
Re: Blocking client based on HTTP request Sandman <mr@sandman.net> - 2013-05-24 21:11 +0200
csiph-web