Haproxy 1.5 has src_conn_rate which can be used for that. I personally
haven't used it. I just remember reading about it.

Vivek

On Tue, Mar 13, 2012 at 8:30 AM, Jerry Champlin <
[email protected]> wrote:

> One way to do this is to find it in the logs with a script and then have
> that script apply a black hole rule to iptables.  As a matter of course, we
> use a similar approach to block rapid failed login attempts on servers with
> public facing ssh.  It works very well.
>
> -Jerry
>
> Jerry Champlin
> Absolute Performance Inc.
> Phone: 303-565-4401
> --
> Enabling businesses to deliver critical applications at lower cost and
> higher value to their customers.
>
>
>
> On Tue, Mar 13, 2012 at 2:57 AM, fred hu <[email protected]> wrote:
>
>> Hi, All
>>
>> We are using haproxy since 2009 for LB.
>>
>> Recently we encountered some malicious clients sending request on same
>> URL with especially high rate ( 100r/s and lasting for some minutes)
>> Is there any possibility to block such user while keep serving the normal
>> clients? (Surly We have no idea on malicious users ip before (s)he attacks)
>> I read the configuration manual and find we have
>> fe_sess_rate/be_sess_rate ACLs. But it seems for all clients.
>>
>> So, my question here is : Can we find/block a malicious user based on his
>> request rate?
>>
>> Thx!
>>
>> --
>> *Fred Hu*
>> *Best Regards*
>>
>>
>

Reply via email to