hi Jon,

> I'm open to other suggestions of what mechanisms we might add to deal
> with rogue clients. As OSM becomes even more popular we are bound to get
> more clients making bad requests.

If the server is based on Apache, you might want to take a look at
mod_security (http://www.modsecurity.org/). While it adds a performance
hit, you could create very specific OSM rules, since you know in advance
requests you will allow (and block all the rest, so whitelisting).
Combined with a tool like HTTP guardian to put rogue clients in a
temporary blocklist (iptables on Linux for example) it might be worth
the performance hit.

Just my EUR 0.02.

armijn

-- 
-------------------------------------------------------------------------
[EMAIL PROTECTED] | http://www.uulug.nl/ | UULug: Utrecht Linux Users Group
-------------------------------------------------------------------------


_______________________________________________
dev mailing list
[email protected]
http://lists.openstreetmap.org/cgi-bin/mailman/listinfo/dev

Reply via email to