Home PC Games Linux Windows Database Network Programming Server Mobile  
           
  Home \ Linux \ Limit the use of the request being Nginx Flood attack     - Linux, Oracle listen address modification (Database)

- Linux System Getting Started Learning: Change the name of the network interface on CentOS7 (Linux)

- General Linux interface server parameter tuning (Server)

- CentOS / Linux kernel upgrade (Linux)

- 5 interesting Linux command line tips (Linux)

- Using IntelliJ IDEA 13 integrated development environment to build Android (Linux)

- Oracle archive log deletion (Database)

- Ubuntu font settings: Using Windows Font (Linux)

- Python: Finding meet the conditions specified in the file directory (Programming)

- Kubernetes (k8s) environment to build combat (Server)

- Ubuntu How to install screen recording tool Simple Screen Recorder 0.3.1 (Linux)

- Hadoop 2.2.0 installation development environment (standalone pseudo-distributed mode) (Server)

- Boost-- time and date - (1) timer library introduction (Programming)

- Xtrabackup creates a slave node without downtime (Database)

- Nginx Keepalived Nginx monitoring scripts (Server)

- NAT (network address translation) Realization (Linux)

- Getting Started with Linux system to learn: How to compress JPEG images on the command line (Linux)

- Introduction to Linux Shell (Programming)

- CentOS 6.5 start ActiveMQ being given to solve (Server)

- Camouflage Nginx Web server version to prevent invasion (Linux)

 
         
  Limit the use of the request being Nginx Flood attack
     
  Add Date : 2018-11-21      
         
         
         
  Test

I will simply tell you how to configure request restrictions Nginx module and it is how to protect your site, you are attacked and prevent DDOS or other HTTP-based denial of service attacks.

For this test, I would like to save the page in Blitz.io (now free service) named about.html, for testing limit_req instructions.

First, I use the following command in the Blitz, to initiate and 1075 concurrent requests for one minute, the response timeout to two minutes, the California region, and set the state to get rid of all the state 200 other than an abnormal state, even 503 are not considered to be successful.

-p 1-1075: 60 --status 200 -T 2000 -r california http://kbeezie.com/about.html


Not too bad, right? But if it is a php file. It might cause users 502/504 status PHP process, so that the server has crashed or unresponsive. Especially if you do not use any protection or other VPS cheap servers, the failure rate will be higher. (Original ad, here shield)

Of course, you can use the cache or other tools to improve server performance and response capability, for example, you can use WordPress you definitely want to use wordpress caching plugin. Da For those type of people we can use the limit request module.

In Nginx we create a regional http {}, I told him to blitz set 5 requests per second, the maximum data capacity of 10MB. I use as a session variable $ binary_remote_addr let yourself than normal visitors $ remote_addr can access greater than 10MB Space.

limit_req_zone $ binary_remote_addr zone = blitz: 10m rate = 5r / s;
However, the definition of weeks in the server on these rules:

location = /about.html {
limit_req zone = blitz nodelay;
}

Then reload Nginx configuration

You will find only more than 285 people now have access to the server, the number of requests per second at 4.75, we set no more than 5 times per second, check the log you will find no access to the requests are HTTP 503, access to all HTTP 200.

Such an arrangement would like to use for access to restricted areas is helpful, it can also be applied on all php requests.

PHP application requests limit

If you want to restrict all PHP application limits, you can do this:

location ~ \ .php {
limit_req zone = flood;
include php_params.conf;
fastcgi_pass unix: /tmp/php5-fpm.sock;
}
It can help you stuff some settings like acceleration or deceleration, in order to deal with unexpected demand or configuration item details without delay, hit here:. HttpLimitReqModule.

Note:

You may notice that the chart above test 1075 user requests, here are misleading, because all access requests are from California and located in the same IP (50.18.0.223).

I find it difficult to achieve a real high-traffic network or DDOS (distributed denial of service attack). This is why we are the number of users with access to a successful IP is not great. Test server load also affect the user's access number or region. the number of users you can use the free version is the maximum concurrent access to 50. of course, you can spend $ 49 per day US knife allows 1000 users to access your site.

If you have enough memory with bandwidth of a single IP address test is very easy to use this tool can be achieved: high concurrency, ab, openload etc. is only in the terminal interface, it is no UI.

Of course, you want to test yourself, remember to use status flag, because the Blitz in about 5 seconds after the response to the access request.

Better alternatives

There will not be further explained in more detail, if you seriously want to prevent DDOS attack your server or multi-service attack, there are other great software tools like iptables (linux), pf (packet filter for BSD), or you the server hardware, you can use your hardware firewall. above limitation module will stop coming through HTTP request flood attack, it does not prevent ping packet flooding attacks or other vulnerabilities in these cases you can turn off unneeded services and ports not needed to prevent others breakthrough.

For example, my server external network ports open only HTTP / HTTPS and SSH. Like these services bind local MySQL connections also some common service can be set to the port is not commonly used, so as not to be sniffed filter (iptables / pf this case would be helpful).
     
         
         
         
  More:      
 
- Python MySQL database connection (Database)
- Linux Oracle environment variable is invalid Problem Solving (Database)
- Linux environment variable configuration and save places (Linux)
- shell script: the number of characters in the text to print no more than 6 words (Programming)
- Simple configuration shell scripts virtual machine environment experiment (Linux)
- The multiplexed signal driving IO (Programming)
- Debian 7.7 Installation and Configuration (Linux)
- Linux common network tools: batch scanning of nmap hosting service (Linux)
- mysqldump MySQL command-line tool (Database)
- How SSHfs mount a remote file system on Linux (Linux)
- The security administrator network analysis tools SATAN Introduction under Linux (Linux)
- Java static code analysis tool Infer (Programming)
- How to build a custom exclusive Ubuntu Live CD (Linux)
- Vim useful plugin: EasyGrep (Linux)
- CentOS7 install and configure Nagios (Server)
- Oracle study notes view (Database)
- Linux platform NTOP Installation and Configuration (Linux)
- Under CentOS Linux automatic backup MySQL database daily (Database)
- Recovery from MySQL master data consistency summary (Database)
- Use Python to perform system commands common usage (Programming)
     
           
     
  CopyRight 2002-2022 newfreesoft.com, All Rights Reserved.