DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT <http://nagoya.apache.org/bugzilla/show_bug.cgi?id=17832>. ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND INSERTED IN THE BUG DATABASE.
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=17832 Nasty customer javascript causes cascading reloads of same page from client ------- Additional Comments From [EMAIL PROTECTED] 2003-03-16 15:49 ------- The customer ended up leaving in production a 'fixed' version of the page reload javascript. I am still seeing the mini DOS flood this script can create a few times a day. Argh! I just found it interesting how the Apache 1.3 and 2.0 behaviour differed. Thought it might be something you would want to look into. For a long term solution I am looking at porting the mod_dosevasive Apache 1.3 module to Apache 2.0. http://www.networkdweebs.com/stuff/security.html --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]
