The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[TOOL] Apache mod_evasive - Evasive Maneuvers for Apache


<< Previous INDEX Search src / Print Next >>
From: SecuriTeam <support@securiteam.com.>
To: [email protected]
Date: 7 Feb 2007 17:58:06 +0200
Subject: [TOOL] Apache mod_evasive - Evasive Maneuvers for Apache
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id: <20070208081447.C385F57B4@mail.tyumen.ru.>
X-Virus-Scanned: antivirus-gw at tyumen.ru

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html 

- - - - - - - - -




  Apache mod_evasive - Evasive Maneuvers for Apache
------------------------------------------------------------------------


SUMMARY



DETAILS

mod_evasive is an evasive maneuvers module for Apache to provide evasive 
action in the event of an HTTP DoS or DDoS attack or brute force attack. 
It is also designed to be a detection and network management tool, and can 
be easily configured to talk to ipchains, firewalls, routers, and 
etcetera. mod_evasive presently reports abuses via email and syslog 
facilities.

Detection is performed by creating an internal dynamic hash table of IP 
Addresses and URIs, and denying any single IP address from any of the 
following:
 * Requesting the same page more than a few times per second
 * Making more than 50 concurrent requests on the same child per second
 * Making any requests while temporarily blacklisted (on a blocking list)

This method has worked well in both single-server script attacks as well 
as distributed attacks, but just like other evasive tools, is only as 
useful to the point of bandwidth and processor consumption (e.g. the 
amount of bandwidth and processor required to receive/process/respond to 
invalid requests), which is why it's a good idea to integrate this with 
your firewalls and routers for maximum protection.

This module instantiates for each listener individually, and therefore has 
a built-in cleanup mechanism and scaling capabilities. Because of this 
per-child design, legitimate requests are never compromised (even from 
proxies and NAT addresses) but only scripted attacks. Even a user 
repeatedly clicking on 'reload' should not be affected unless they do it 
maliciously. mod_evasive is fully tweakable through the Apache 
configuration file, easy to incorporate into your web server, and easy to 
use.


ADDITIONAL INFORMATION

The information has been provided by Jonathan A. Zdziarski.
To keep updated with the tool visit the project's homepage at:  
<http://www.zdziarski.com/projects/mod_evasive/>; 
http://www.zdziarski.com/projects/mod_evasive/




This bulletin is sent to members of the SecuriTeam mailing list. To unsubscribe from the list, send mail with an empty subject line and body to: [email protected] In order to subscribe to the mailing list, simply forward this email to: [email protected]

DISCLAIMER: The information in this bulletin is provided "AS IS" without warranty of any kind. In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру