GoFuckYourself.com - Adult Webmaster Forum

GoFuckYourself.com - Adult Webmaster Forum (https://gfy.com/index.php)
-   Fucking Around & Business Discussion (https://gfy.com/forumdisplay.php?f=26)
-   -   Server question..... Being hammered by POST (https://gfy.com/showthread.php?t=1151729)

Lester 10-10-2014 06:16 AM

Server question..... Being hammered by POST
 
OK, so it seems I have some kinda bot blasting away at a domain name. Sending some kinda POST data to a page that doesn't even exist.

No matter what ip address I throw this domain on the bot starts hammering it almost immediately. 40-50 per second, from all kinda ip addresses. Just this one domain.

We put 2 ips in into Null Routes and the server became responsive again....

Any idea how to deal with this?

The domain seems like it's gonna be attacked no matter where I place it, my servers or some other host..... Support didn't feel a hardware firewall was gonna solve it either...

Ugh

dichotomy 10-10-2014 06:26 AM

I think, only way would be filtering IP's out and firewalling them till they stop bothering you.

Sounds tedious, but any other filtering method will involve web server processing those request anyway.

Depending on what they are hammering and how smart those bots are (eat cookies, know javascript), it might be worth trying to redirect them to some other domain like msn.com via .htaccess ? Could lessen the load possibly if they hammer your PHP/SQL.

Just brainstorming, hope it helps!

PAR 10-10-2014 09:47 AM

setup cloudflare once setup have yoru host change your IP...

pinkmasterx 10-10-2014 10:27 AM

You can install a module to limit number of connexion by ip.
5 is a good limitation, a browser normaly can't open more than 5 connexion.
http dominia.org/djao/limitipconn.html

That limit the impact of this type attack.
Fail2ban can help you too.
If this 404 pages, you can add rule to block ip with too much 404 / min for example

wich that help you

WDF 10-10-2014 10:52 AM

Install CSF or some other IP Table firewall and ban IPs with more then a specified number of connections.

Install Mod_Security with OWASP rules set to block malicious requests.

Get a so you start or ovh server and let their anti-dos network do the work for you.

dichotomy 10-10-2014 11:22 AM

Cloud actually might help as well, but won't be cheap - this way you will spread the bot load across the multiple datacenters... not a bad idea.

Limiting connections per IP won't help unless thats a really dumb bot in which case just blocking it in firewall would have done the trick...

sandman! 10-10-2014 12:04 PM

if they are using random ips there is no cheap/easy way to block them.

cheapest way is to have enough hardware when it comes to the server to just serve up the 404 pages that they hitting.

tuning the webserver so the requests dont slow your site down should not be hard for any decent tech.

dichotomy 10-10-2014 12:13 PM

Quote:

Originally Posted by sandman! (Post 20249689)
if they are using random ips there is no cheap/easy way to block them.

cheapest way is to have enough hardware when it comes to the server to just serve up the 404 pages that they hitting.

tuning the webserver so the requests dont slow your site down should not be hard for any decent tech.

Amen. You can try and get nginx up before as http proxy - that can lower loads A LOT.

PeR930 10-10-2014 02:49 PM

Try cloudflare. It can block known bad ips before they hit your server.

Lester 10-11-2014 03:35 AM

Tossed that domain unto a new host just to see what might happen,
knowing full well what probably would.

Got a warning email around 2am that there appeared to be an attack, requests to the domain are being suspended.

Same POST requests of some sort toward a page that does not exists, actually i never got to upload any pages to the new setup.

Bunches and bunches of different ips from many locations doing the deed.


Just like I thought it would be.....

Barry-xlovecam 10-11-2014 04:58 AM

http://perishablepress.com/protect-post-requests/

freecartoonporn 10-11-2014 05:32 AM

cloudflare or nginx

buyandsell 10-11-2014 06:09 PM

hey I have a Cisco ASA that will do packet inspection and block POST or whatever you can find a ASA5200 for a few grand on ebay

Before that I used IPTABLES sort of a poormans packet inspection, heres an example:

iptables -A INPUT -p tcp --dport 80 -i eth0 -j HTTP_FILTER
iptables -A HTTP_FILTER -j DROP -m string --from 30 --to 60 --algo bm --string 'POST '

this is kinda rudimentry and you need to keep it stateless - I had troubles with CONNTRACK if it wasn't stateless

jimmycastor 10-12-2014 02:16 AM

had the same type of attacks,poor man solution csf combined with cloudflare helped me a lot ,
finding good settings for csf is important , if that wont work maybe go for the more advanced methods mentioned in here

Socks 10-12-2014 02:21 AM

Lester from DOD?

BradBreakfast 10-12-2014 02:41 AM

We can solve this for you easily.

E-mail me to discuss.

http://i.imgur.com/N5poFkO.png


All times are GMT -7. The time now is 04:24 AM.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc123