hi Jon, > I'm open to other suggestions of what mechanisms we might add to deal > with rogue clients. As OSM becomes even more popular we are bound to get > more clients making bad requests.
If the server is based on Apache, you might want to take a look at mod_security (http://www.modsecurity.org/). While it adds a performance hit, you could create very specific OSM rules, since you know in advance requests you will allow (and block all the rest, so whitelisting). Combined with a tool like HTTP guardian to put rogue clients in a temporary blocklist (iptables on Linux for example) it might be worth the performance hit. Just my EUR 0.02. armijn -- ------------------------------------------------------------------------- [EMAIL PROTECTED] | http://www.uulug.nl/ | UULug: Utrecht Linux Users Group ------------------------------------------------------------------------- _______________________________________________ dev mailing list [email protected] http://lists.openstreetmap.org/cgi-bin/mailman/listinfo/dev

