DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG 
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://nagoya.apache.org/bugzilla/show_bug.cgi?id=17832>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND 
INSERTED IN THE BUG DATABASE.

http://nagoya.apache.org/bugzilla/show_bug.cgi?id=17832

Nasty customer javascript causes cascading reloads of same page from client





------- Additional Comments From [EMAIL PROTECTED]  2003-03-16 15:49 -------
The customer ended up leaving in production a 'fixed' version of the
page reload javascript.  I am still seeing the mini DOS flood this
script can create a few times a day.  Argh!

I just found it interesting how the Apache 1.3 and 2.0 behaviour differed.
Thought it might be something you would want to look into.

For a long term solution I am looking at porting the mod_dosevasive
Apache 1.3 module to Apache 2.0.

http://www.networkdweebs.com/stuff/security.html

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to