Groups | Search | Server Info | Keyboard shortcuts | Login | Register [http] [https] [nntp] [nntps]


Groups > comp.os.linux.security > #311

Re: Blocking client based on HTTP request

From David Hough <noone$$@llondel.org>
Organization the bus stop
Date 2013-05-24 19:42 +0100
Subject Re: Blocking client based on HTTP request
Newsgroups comp.os.linux.networking, comp.os.linux.security, comp.infosystems.www.servers.unix
References <mr-CA16B8.15073524052013@News.Individual.NET>
Followup-To comp.os.linux.security
Message-ID <bto47a-45c.ln1@llondel.org> (permalink)

Cross-posted to 3 groups.

Followups directed to: comp.os.linux.security

Show all headers | View raw


Sandman wrote:

> So, as my other thread may suggest, I have problems with users flooding
> my server with requests for /wpad.dat
> 
> Is there an easy way to use iptables to trigger on those requests and
> then add the IP to a blacklist?
> 
Try fail2ban <http://www.fail2ban.org> as one possible candidate.

I've not yet tried to use it but it's on my to-do list.

Dave

Back to comp.os.linux.security | Previous | NextPrevious in thread | Next in thread | Find similar


Thread

Blocking client based on HTTP request Sandman <mr@sandman.net> - 2013-05-24 15:07 +0200
  Re: Blocking client based on HTTP request David Hough <noone$$@llondel.org> - 2013-05-24 19:42 +0100
    Re: Blocking client based on HTTP request Sandman <mr@sandman.net> - 2013-05-24 21:11 +0200

csiph-web