2010-02-26
- 遇到沒品的 426 .... 沒事同時發起個 176 個 web 連線到 trac ....
jazz@drbl:~$ cat 10-02-26_trac_down_reason.log | grep ":" | awk '{ print $5 }' | sed 's#\:.*##' | sort -n | uniq -c | sort -n ... 略 .... 3 114.25.224.118 176 124.254.15.50
- Open Source Film - 建議 rider 做實驗可採用創用授權的影片,也比較好用於公開發表上。
- Big Buck Bunny - http://www.bigbuckbunny.org/ (2008)
- Elephants Dream - http://orange.blender.org/ (2006)
System Security
- Defending against brute force ssh attacks - 介紹了五種保護 SSH 的方法
- 用 port-knocking - 平常 port 22 是關著的, 只有當另外的某個 port 被 request 時, 再打開 port 22 接受連線
- 用 iptables 防禦 - Using iptables to rate-limit incoming connections
- portsentry - Portsentry & Logcheck
- shorewall - 筆記:使用shorewall和dnsmasq在Ubuntu架設簡單的NAT
- fail2ban -以 Fail2ban 封鎖嘗試侵入的 IP
Apache / Lighttp Security
- 為了預防同一個 IP 同時間佔據太多連線,過去大家好像都用 !LimitIPConn 這個模組,不過 Apache 2.1
- 官方網站: http://dominia.org/djao/limitipconn.html - Apache 1.3 版本 - 有 debian etch 套件, 不過到了 lenny 就沒了(因為是 Apache 1.3)
- 官方網站: http://dominia.org/djao/limitipconn2.html - Apache 2.x 版本 - 非官方 Debian 套件
- <Ubuntu> Apache 2.x 安裝 limitipconn 模組防多線下載
- 另一個 Apache 模組 - libapache2-mod-bw 套件 - 官網 http://apache.ivn.cl/#bandwidth
- [參考] 那如果用 Lighttpd 呢?? 從 "lighty > limit amount of concurrent connections by client?", 寫到:
- 修改 server.modules 設定檔
server.modules = ( "mod_rewrite", "mod_access", "mod_auth", "mod_status", "mod_fastcgi", "mod_compress", "mod_rrdtool", "mod_accesslog", "mod_evasive" );
- 指定每個 IP 最多可連線個數:
evasive.max-conns-per-ip = 10
- 修改 server.modules 設定檔
Last modified 15 years ago
Last modified on Mar 31, 2010, 10:11:19 PM
Attachments (4)
- 10-02-26_trac_down_reason.log (18.0 KB) - added by jazz 15 years ago.
- 10-02-26_abuse_ip.txt (15.3 KB) - added by jazz 15 years ago.
- 10-02-26-apache_processes-day.png (16.8 KB) - added by jazz 15 years ago.
- 10-02-26-apache_processes-week.png (20.2 KB) - added by jazz 15 years ago.
Download all attachments as: .zip