Re: [users@httpd] Apache in under attack.

2021-01-17 Thread Jason Long
Is you mean below lines in "httpd.conf" file? LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\"" combined LogFormat "%h %l %u %t \"%r\" %>s %b" common LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\" %I %O" combinedio On Thursday, January 14,

RE: [users@httpd] Apache in under attack. [EXT]

2021-01-14 Thread James Smith
ect: Re: [users@httpd] Apache in under attack. [EXT] On 14 Jan 2021, at 04:48, Jason Long wrote: > Server have 4 CPU cores and 6GB of RAM. > I pasted Apache configuration. In your opinion, which parts of servers must > be examine? Throwing more resources at the problem is not l

Re: [users@httpd] Apache in under attack.

2021-01-14 Thread @lbutlr
On 14 Jan 2021, at 04:48, Jason Long wrote: > Server have 4 CPU cores and 6GB of RAM. > I pasted Apache configuration. In your opinion, which parts of servers must > be examine? Throwing more resources at the problem is not likely to fix the problem. You need to figure out what is going on

Re: [users@httpd] Apache in under attack.

2021-01-14 Thread Richard
You should look at adding the %D and %T format strings to your httpd access log configuration so that you can capture the amount of time spent in delivery of a resource. > Date: Thursday, January 14, 2021 11:48:55 + > From: Jason Long > > Server have 4 CPU cores and 6GB of RAM. > I pasted

Re: [users@httpd] Apache in under attack.

2021-01-14 Thread Jason Long
Server have 4 CPU cores and 6GB of RAM. I pasted Apache configuration. In your opinion, which parts of servers must be examine? On Wednesday, January 13, 2021, 08:30:58 PM GMT+3:30, @lbutlr wrote: > On 12 Jan 2021, at 01:52, Jason Long wrote: > > It show me: > > 13180 X.X.X.X > 

Re: [users@httpd] Apache in under attack.

2021-01-13 Thread @lbutlr
> On 12 Jan 2021, at 01:52, Jason Long wrote: > > It show me: > > 13180 X.X.X.X >1127 X.X.X.X > 346 X.X.X.X > 294 X.X.X.X > 241 X.X.X.X > 169 X.X.X.X > 168 X.X.X.X > 157 X.X.X.X > 155 X.X.X.X > 153 X.X.X.X Your server would not be getting bogged down

RE: [users@httpd] Aw: Re: [users@httpd] Apache in under attack. [EXT]

2021-01-13 Thread James Smith
ly have about 20-30 modules running. > > -Original Message- > From: Jason Long > Sent: 12 January 2021 11:14 > To: users@httpd.apache.org > Subject: Re: [users@httpd] Aw: Re: [users@httpd] Apache in under > attack. [EXT] > > It show me: > > # netstat -n

Re: [users@httpd] Aw: Re: [users@httpd] Apache in under attack. [EXT]

2021-01-13 Thread Antony Stone
On Wednesday 13 January 2021 at 10:59:12, Andrea Croci wrote: > Hi James, > > what was the command you used to see that apache uses ~1GB of memory? I > deleted the mail and that was a bad idea: there were some very useful > commands you were giving us here. You can view the entire thread

Re: [users@httpd] Aw: Re: [users@httpd] Apache in under attack. [EXT]

2021-01-13 Thread Andrea Croci
2021 11:14 To: users@httpd.apache.org Subject: Re: [users@httpd] Aw: Re: [users@httpd] Apache in under attack. [EXT] It show me: # netstat -n | grep ':80 ' | grep -v TIME_WAIT tcp6       0      0 X.X.X.X:80        X.X.X.X:16126      FIN_WAIT2 tcp6       0      0 X.X.X.X:80        X.X.X.X:64595

Re: [users@httpd] Aw: Re: [users@httpd] Apache in under attack. [EXT]

2021-01-12 Thread Gene Heskett
On Tuesday 12 January 2021 05:01:09 Jason Long wrote: > I did below rule, but not worked: > # iptables -A INPUT -p tcp --syn --dport 80 -m connlimit > --connlimit-above 20 -j REJECT --reject-with tcp-reset Lessons learned while trying to stop the &^$>#@# bots from mirroring my content on a 10

RE: [users@httpd] Aw: Re: [users@httpd] Apache in under attack. [EXT]

2021-01-12 Thread James Smith
sage- From: Jason Long Sent: 12 January 2021 11:51 To: users@httpd.apache.org Subject: Re: [users@httpd] Aw: Re: [users@httpd] Apache in under attack. [EXT] Output is: # netstat -n | grep ':80 ' | wc      12      72     960 > How to disable modules? It just a WordPress website. On

Re: [users@httpd] Aw: Re: [users@httpd] Apache in under attack. [EXT]

2021-01-12 Thread Jason Long
To: users@httpd.apache.org Subject: Re: [users@httpd] Aw: Re: [users@httpd] Apache in under attack. [EXT] It show me: # netstat -n | grep ':80 ' | grep -v TIME_WAIT tcp6       0      0 X.X.X.X:80        X.X.X.X:16126      FIN_WAIT2   tcp6       0      0 X.X.X.X:80        X.X.X.X:64595      FIN_WAIT2

RE: [users@httpd] Aw: Re: [users@httpd] Apache in under attack. [EXT]

2021-01-12 Thread James Smith
modules running. -Original Message- From: Jason Long Sent: 12 January 2021 11:14 To: users@httpd.apache.org Subject: Re: [users@httpd] Aw: Re: [users@httpd] Apache in under attack. [EXT] It show me: # netstat -n | grep ':80 ' | grep -v TIME_WAIT tcp6       0      0 X.X.X.X:80        X.X.X.X

Re: [users@httpd] Aw: Re: [users@httpd] Apache in under attack. [EXT]

2021-01-12 Thread Jason Long
10:33 To: users@httpd.apache.org Subject: Re: [users@httpd] Aw: Re: [users@httpd] Apache in under attack. [EXT] Output is: 1688 323400 80850   0 /usr/sbin/httpd -DFOREGROUND  6384 517620 129405   0 /usr/sbin/httpd -DFOREGROUND 1163280 3898288 974572  63 /usr/sbin/httpd -DFOREGROUND 1250040 3912624

RE: [users@httpd] Aw: Re: [users@httpd] Apache in under attack. [EXT]

2021-01-12 Thread James Smith
: 12 January 2021 10:33 To: users@httpd.apache.org Subject: Re: [users@httpd] Aw: Re: [users@httpd] Apache in under attack. [EXT] Output is: 1688 323400 80850   0 /usr/sbin/httpd -DFOREGROUND  6384 517620 129405   0 /usr/sbin/httpd -DFOREGROUND 1163280 3898288 974572  63 /usr/sbin/httpd

Re: [users@httpd] Apache in under attack. [EXT]

2021-01-12 Thread Jason Long
January 2021 10:06 To: users@httpd.apache.org Subject: Re: [users@httpd] Apache in under attack. [EXT] Modules are: https://urldefense.proofpoint.com/v2/url?u=https-3A__paste.ubuntu.com_p_DJSWpSP7xZ_=DwIFaQ=D7ByGjS34AllFgecYw0iC6Zq7qlm8uclZFI0SqQnqBo=oH2yp0ge1ecj4oDX0XM7vQ=puY

Re: [users@httpd] Aw: Re: [users@httpd] Apache in under attack. [EXT]

2021-01-12 Thread Jason Long
] Aw: Re: [users@httpd] Apache in under attack. [EXT] I did below rule, but not worked: # iptables -A INPUT -p tcp --syn --dport 80 -m connlimit --connlimit-above 20 -j REJECT --reject-with tcp-reset On Tuesday, January 12, 2021, 01:15:40 PM GMT+3:30, Florian Schwalm wrote: It can

RE: [users@httpd] Apache in under attack. [EXT]

2021-01-12 Thread James Smith
Subject: Re: [users@httpd] Apache in under attack. [EXT] System administrators doing it manually??? On Tuesday, January 12, 2021, 01:28:50 PM GMT+3:30, James Smith wrote: Rate limiting may work - but the rate may be just slightly to slow for your setting - manually doing it is a good

RE: [users@httpd] Apache in under attack. [EXT]

2021-01-12 Thread James Smith
Sometimes we are attacked from a farm of machines so it may have to be an ip range that is the issue -Original Message- From: James Smith Sent: 12 January 2021 10:19 To: 'users@httpd.apache.org' Subject: RE: [users@httpd] Apache in under attack. [EXT] Yes - it is something we need

RE: [users@httpd] Aw: Re: [users@httpd] Apache in under attack. [EXT]

2021-01-12 Thread James Smith
Message- From: Jason Long Sent: 12 January 2021 10:01 To: users@httpd.apache.org Subject: Re: [users@httpd] Aw: Re: [users@httpd] Apache in under attack. [EXT] I did below rule, but not worked: # iptables -A INPUT -p tcp --syn --dport 80 -m connlimit --connlimit-above 20 -j REJECT --reject

RE: [users@httpd] Apache in under attack. [EXT]

2021-01-12 Thread James Smith
) proxy_ftp_module (shared) proxy_http_module (shared) rewrite_module (shared) setenvif_module (shared) status_module (shared) -Original Message- From: Jason Long Sent: 12 January 2021 10:06 To: users@httpd.apache.org Subject: Re: [users@httpd] Apache in under attack. [EXT] Modules

Re: [users@httpd] Apache in under attack. [EXT]

2021-01-12 Thread Jason Long
Sent: 12 January 2021 09:21 To: users@httpd.apache.org Subject: Re: [users@httpd] Apache in under attack. [EXT] Thank you, but "Firewalld" or "iptables" can't do it automatically? When an IP sending many request then it automatically blocked. On Tuesday, January 12, 202

Re: [users@httpd] Apache in under attack. [EXT]

2021-01-12 Thread Jason Long
development stuff it is a better flavour of linux} What is the output of: apache2 -t -D DUMP_MODULES to see what modules you have installed -Original Message- From: Jason Long Sent: 12 January 2021 09:43 To: users@httpd.apache.org Subject: Re: [users@httpd] Apache in under attack. [EXT

Re: [users@httpd] Aw: Re: [users@httpd] Apache in under attack. [EXT]

2021-01-12 Thread Jason Long
k to dynamic > content. > > James > > -----Original Message----- > From: James Smith > Sent: 12 January 2021 09:09 > To: users@httpd.apache.org > Subject: RE: [users@httpd] Apache in under attack. [EXT] > > Put a firewall rule into block whatever that

RE: [users@httpd] Apache in under attack. [EXT]

2021-01-12 Thread James Smith
Rate limiting may work - but the rate may be just slightly to slow for your setting - manually doing it is a good thing ... -Original Message- From: Jason Long Sent: 12 January 2021 09:21 To: users@httpd.apache.org Subject: Re: [users@httpd] Apache in under attack. [EXT] Thank you

RE: [users@httpd] Apache in under attack. [EXT]

2021-01-12 Thread James Smith
installed -Original Message- From: Jason Long Sent: 12 January 2021 09:43 To: users@httpd.apache.org Subject: Re: [users@httpd] Apache in under attack. [EXT] Apache configuration is: https://urldefense.proofpoint.com/v2/url?u=https-3A__paste.ubuntu.com_p_RTC2WWMdYH_=DwIFaQ

Re: [users@httpd] Apache in under attack.

2021-01-12 Thread Jason Long
Apache configuration is: https://paste.ubuntu.com/p/RTC2WWMdYH/ And "www.conf" is: https://paste.ubuntu.com/p/S9q5Kwpfcc/ And other settings: https://paste.ubuntu.com/p/NydSyZghJ8/ Which one is not OK? On Tuesday, January 12, 2021, 12:23:52 PM GMT+3:30, Jason Long wrote: It show

[users@httpd] Aw: Re: [users@httpd] Apache in under attack. [EXT]

2021-01-12 Thread Florian Schwalm
-Original Message- From: James Smith Sent: 12 January 2021 09:09 To: users@httpd.apache.org Subject: RE: [users@httpd] Apache in under attack. [EXT] Put a firewall rule into block whatever that first IP address is then. Something like: firewall-cmd --

Re: [users@httpd] Apache in under attack. [EXT]

2021-01-12 Thread Jason Long
ervers - one serving static content and proxying back to dynamic content. James -Original Message- From: James Smith Sent: 12 January 2021 09:09 To: users@httpd.apache.org Subject: RE: [users@httpd] Apache in under attack. [EXT] Put a firewall rule into block whatever that first IP address

RE: [users@httpd] Apache in under attack. [EXT]

2021-01-12 Thread James Smith
of small static request (images/css/js) where you run two web servers - one serving static content and proxying back to dynamic content. James -Original Message- From: James Smith Sent: 12 January 2021 09:09 To: users@httpd.apache.org Subject: RE: [users@httpd] Apache in under attack. [EXT

RE: [users@httpd] Apache in under attack. [EXT]

2021-01-12 Thread James Smith
.log | awk '{print $1}' | sort | uniq -c | sort -nr | head or I often use cut instead of awk.. tail -1 access.log | cut -d ' ' -f 1 | sort | uniq -c | sort -nr | head -Original Message- From: Jason Long Sent: 12 January 2021 08:53 To: users@httpd.apache.org Subject: Re: [users@htt

Re: [users@httpd] Apache in under attack.

2021-01-12 Thread Jason Long
It show me: 13180 X.X.X.X    1127 X.X.X.X      346 X.X.X.X      294 X.X.X.X      241 X.X.X.X      169 X.X.X.X      168 X.X.X.X     157 X.X.X.X     155 X.X.X.X     153 X.X.X.X On Tuesday, January 12, 2021, 07:12:22 AM GMT+3:30, Bender, Charles wrote: Run this against your log file

Re: [users@httpd] Apache in under attack.

2021-01-11 Thread Ruben Safir
On 1/11/21 6:06 PM, Jason Long wrote: > Hello, > On a CentOS web server with Apache, someone make a lot of request and it make > slowing server. when I disable "httpd" service then problem solve. How can I > find who made a lot of request? > [url]https://imgur.com/O33g3ql[/url] > Any idea to

Re: [users@httpd] Apache in under attack.

2021-01-11 Thread Bender, Charles
Run this against your log file in bash shell cat access.log | awk '{print $1}' | sort | uniq -c | sort -nr | head This will show you most frequent IPs, sorted in descending order. Block as needed On 1/11/21, 7:11 PM, "Jason Long" wrote: Can you help me?

Re: [users@httpd] Apache in under attack.

2021-01-11 Thread Nick Folino
I just did. Look at the logs. What doesn't seem right? On Mon, Jan 11, 2021 at 7:11 PM Jason Long wrote: > Can you help me? > > > > > > > On Tuesday, January 12, 2021, 03:36:30 AM GMT+3:30, Nick Folino < > n...@folino.us> wrote: > > > > > > Concentrate on just one... > > On Mon, Jan 11, 2021

Re: [users@httpd] Apache in under attack.

2021-01-11 Thread Jason Long
Can you help me?  On Tuesday, January 12, 2021, 03:36:30 AM GMT+3:30, Nick Folino wrote: Concentrate on just one... On Mon, Jan 11, 2021 at 7:02 PM Jason Long wrote: > It is a lot of IP addresses !!! > > > > > > > On Tuesday, January 12, 2021, 03:30:02 AM GMT+3:30, Nick

Re: [users@httpd] Apache in under attack.

2021-01-11 Thread Nick Folino
Concentrate on just one... On Mon, Jan 11, 2021 at 7:02 PM Jason Long wrote: > It is a lot of IP addresses !!! > > > > > > > On Tuesday, January 12, 2021, 03:30:02 AM GMT+3:30, Nick Folino < > n...@folino.us> wrote: > > > > > > How to find pattern: > Look at log. > Find bad things that are

Re: [users@httpd] Apache in under attack.

2021-01-11 Thread Jason Long
It is a lot of IP addresses !!! On Tuesday, January 12, 2021, 03:30:02 AM GMT+3:30, Nick Folino wrote: How to find pattern: Look at log. Find bad things that are similar. Then: Block bad things from reaching web server. On Mon, Jan 11, 2021 at 6:49 PM Jason Long wrote: > How to

Re: [users@httpd] Apache in under attack.

2021-01-11 Thread Nick Folino
How to find pattern: Look at log. Find bad things that are similar. Then: Block bad things from reaching web server. On Mon, Jan 11, 2021 at 6:49 PM Jason Long wrote: > How to find pattern? > Log show me: https://paste.ubuntu.com/p/MjjVMvRrQc/ > > > > > > > On Tuesday, January 12, 2021,

Re: [users@httpd] Apache in under attack.

2021-01-11 Thread Jason Long
How to find pattern? Log show me: https://paste.ubuntu.com/p/MjjVMvRrQc/ On Tuesday, January 12, 2021, 03:06:12 AM GMT+3:30, Filipe Cifali wrote: Yeah it's probably not going to matter if you don't know what's attacking you before setting up the rules, you need to find the patterns,

Re: [users@httpd] Apache in under attack.

2021-01-11 Thread Filipe Cifali
Yeah it's probably not going to matter if you don't know what's attacking you before setting up the rules, you need to find the patterns, either the attack target or the attackers origins. On Mon, Jan 11, 2021 at 8:26 PM Jason Long wrote: > I used a rule like: > > # firewall-cmd --permanent

Re: [users@httpd] Apache in under attack.

2021-01-11 Thread Jason Long
I used a rule like: # firewall-cmd --permanent --zone="public" --add-rich-rule='rule port port="80" protocol="tcp" accept limit value="100/s" log prefix="HttpsLimit" level="warning" limit value="100/s"' But not matter. On Tuesday, January 12, 2021, 02:47:01 AM GMT+3:30, Filipe Cifali

Re: [users@httpd] Apache in under attack.

2021-01-11 Thread Jason Long
Thank you. I see a lot of request in "/var/log/httpd/access_log". On Tuesday, January 12, 2021, 02:46:10 AM GMT+3:30, Alain D D Williams wrote: On Mon, Jan 11, 2021 at 11:06:33PM +, Jason Long wrote: > Hello, > On a CentOS web server with Apache, someone make a lot of request

Re: [users@httpd] Apache in under attack.

2021-01-11 Thread Filipe Cifali
You need to investigate your logs and find common patterns there, also there are different tools to handle small and big workloads like you could use iptables/nftables to block based on patterns and number of requests. On Mon, Jan 11, 2021 at 8:06 PM Jason Long wrote: > Hello, > On a CentOS web

Re: [users@httpd] Apache in under attack.

2021-01-11 Thread Alain D D Williams
On Mon, Jan 11, 2021 at 11:06:33PM +, Jason Long wrote: > Hello, > On a CentOS web server with Apache, someone make a lot of request and it make > slowing server. when I disable "httpd" service then problem solve. How can I > find who made a lot of request? >