On Tue, 2007-10-30 at 14:32 -0400, George Kozak wrote:

> However, this person still seems to be getting through.  My java 
> process is running from 50%-80% CPU usage.  Does anyone have a good 
> idea on how to shutout a malicious IP in DSpace?

I believe your configuration changes should be sufficient to prevent
access if you restarted/reloaded your daemons and did not have override
restriction directives in place on higher level directories.

On our Linux systems, we attempt to throttle such users with Apache's
mod_cband.  Mark Diggory has created a "bot class" that we regularly add
crawlers that do not respect our robots.txt directives to.

For truly malevolent clients, I drop the route to their machine, or
network, on our production system preventing us from sending the packets
back to them that are necessary to create any connections:

bash# route add -host xxx.xxx.xxx.xxx reject
bash# route add -net xxx.xxx.xxx.0 netmask 255.255.255.0 reject

You'd need to add such routing changes to the appropriate boot scripts
for your Linux distribution to make them persistent.


       - VAB
-
V. Alex Brennen          [EMAIL PROTECTED]
UNIX Systems Administrator 
MIT Libraries                x3-9327

Attachment: signature.asc
Description: This is a digitally signed message part

-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
_______________________________________________
DSpace-tech mailing list
DSpace-tech@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/dspace-tech

Reply via email to