Home PC Games Linux Windows Database Network Programming Server Mobile  
           
  Home \ Linux \ Limit the use of the request being Nginx Flood attack     - Role Object of registerNatives () method (Programming)

- Linux kernel netpoll framework netconsole (Linux)

- About MongoDB query method according to fuzzy field (Database)

- Bash job control (Linux)

- Free compiler install MySQL-5.6.14 (Database)

- RHEL5 multipath configuration (Linux)

- Java static code analysis tool Infer (Programming)

- How to understand the difference between synchronous and asynchronous non-blocking blocking (Programming)

- Java eight new features 8 (Programming)

- Linux system security (Linux)

- To use yum install VLC under CentOS (Linux)

- Availability Hadoop platform - Oozie Workflow (Server)

- SSH without password (Linux)

- Alien Magic: RPM and DEB Mutual Convert (Linux)

- OpenSSL Introduction and compilation steps on Windows, Linux, Mac systems (Linux)

- CentOS 6.5 install Maven and Nexus warehouse agent (Server)

- Deploy Apache Spark cluster environment in Ubuntu (Server)

- How to Install Foreman under Ubuntu (Server)

- Install Gnome Flashback Classic Desktop on Ubuntu 14.10 / Mint 7 (Linux)

- Unetbootin make use U disk loading Linux system (Linux)

 
         
  Limit the use of the request being Nginx Flood attack
     
  Add Date : 2018-11-21      
         
         
         
  Test

I will simply tell you how to configure request restrictions Nginx module and it is how to protect your site, you are attacked and prevent DDOS or other HTTP-based denial of service attacks.

For this test, I would like to save the page in Blitz.io (now free service) named about.html, for testing limit_req instructions.

First, I use the following command in the Blitz, to initiate and 1075 concurrent requests for one minute, the response timeout to two minutes, the California region, and set the state to get rid of all the state 200 other than an abnormal state, even 503 are not considered to be successful.

-p 1-1075: 60 --status 200 -T 2000 -r california http://kbeezie.com/about.html


Not too bad, right? But if it is a php file. It might cause users 502/504 status PHP process, so that the server has crashed or unresponsive. Especially if you do not use any protection or other VPS cheap servers, the failure rate will be higher. (Original ad, here shield)

Of course, you can use the cache or other tools to improve server performance and response capability, for example, you can use WordPress you definitely want to use wordpress caching plugin. Da For those type of people we can use the limit request module.

In Nginx we create a regional http {}, I told him to blitz set 5 requests per second, the maximum data capacity of 10MB. I use as a session variable $ binary_remote_addr let yourself than normal visitors $ remote_addr can access greater than 10MB Space.

limit_req_zone $ binary_remote_addr zone = blitz: 10m rate = 5r / s;
However, the definition of weeks in the server on these rules:

location = /about.html {
limit_req zone = blitz nodelay;
}

Then reload Nginx configuration

You will find only more than 285 people now have access to the server, the number of requests per second at 4.75, we set no more than 5 times per second, check the log you will find no access to the requests are HTTP 503, access to all HTTP 200.

Such an arrangement would like to use for access to restricted areas is helpful, it can also be applied on all php requests.

PHP application requests limit

If you want to restrict all PHP application limits, you can do this:

location ~ \ .php {
limit_req zone = flood;
include php_params.conf;
fastcgi_pass unix: /tmp/php5-fpm.sock;
}
It can help you stuff some settings like acceleration or deceleration, in order to deal with unexpected demand or configuration item details without delay, hit here:. HttpLimitReqModule.

Note:

You may notice that the chart above test 1075 user requests, here are misleading, because all access requests are from California and located in the same IP (50.18.0.223).

I find it difficult to achieve a real high-traffic network or DDOS (distributed denial of service attack). This is why we are the number of users with access to a successful IP is not great. Test server load also affect the user's access number or region. the number of users you can use the free version is the maximum concurrent access to 50. of course, you can spend $ 49 per day US knife allows 1000 users to access your site.

If you have enough memory with bandwidth of a single IP address test is very easy to use this tool can be achieved: high concurrency, ab, openload etc. is only in the terminal interface, it is no UI.

Of course, you want to test yourself, remember to use status flag, because the Blitz in about 5 seconds after the response to the access request.

Better alternatives

There will not be further explained in more detail, if you seriously want to prevent DDOS attack your server or multi-service attack, there are other great software tools like iptables (linux), pf (packet filter for BSD), or you the server hardware, you can use your hardware firewall. above limitation module will stop coming through HTTP request flood attack, it does not prevent ping packet flooding attacks or other vulnerabilities in these cases you can turn off unneeded services and ports not needed to prevent others breakthrough.

For example, my server external network ports open only HTTP / HTTPS and SSH. Like these services bind local MySQL connections also some common service can be set to the port is not commonly used, so as not to be sniffed filter (iptables / pf this case would be helpful).
     
         
         
         
  More:      
 
- The source code compiler installation Nginx 1.8.0 under Ubuntu 14.10 (Server)
- Java garbage collection (Programming)
- Search Linux commands and files - which, whereis, locate, find (Linux)
- Installation under Linux to deploy Java (Linux)
- Detailed Linux platform chip programming process (Programming)
- CentOS6.7 text installation system (Linux)
- Ubuntu / openSUSE users to install Veusz 1.21.1 (Linux)
- CUDA (including GPU card driver) installation process under Ubuntu (Linux)
- Linux operating system ARP Spoofing Defense (Linux)
- Features and prevention methods elaborate network security grayware (Linux)
- The correct method to modify the maximum number of concurrent connections Tomcat 7 (Server)
- IDS Intrusion Detection System built (Linux) (Linux)
- How Linux system password security guarantee (Linux)
- Java executable file to read information from a database copy (Programming)
- What have we learn from the front-end application Nodejs (Programming)
- To install and use Docker under linux (Server)
- PostgreSQL use pgpool achieve high availability (Database)
- Linux - use chroot command (Linux)
- hadoop 2.7.1 High Availability Setup Deployment (Server)
- JQuery implements the same content merge cells (Programming)
     
           
     
  CopyRight 2002-2020 newfreesoft.com, All Rights Reserved.