Hey,

You can have a look to this article to match too many attempts on a
login page :)
http://blog.exceliance.fr/2012/02/27/use-a-load-balancer-as-a-first-row-of-defense-against-ddos/

I don't have any time right now, but I'll write this kind of
configuration example later if you can't manage to make it work.

cheers


On Tue, Mar 13, 2012 at 3:02 PM, Vivek Malik <[email protected]> wrote:
> Haproxy 1.5 has src_conn_rate which can be used for that. I personally
> haven't used it. I just remember reading about it.
>
> Vivek
>
> On Tue, Mar 13, 2012 at 8:30 AM, Jerry Champlin
> <[email protected]> wrote:
>>
>> One way to do this is to find it in the logs with a script and then have
>> that script apply a black hole rule to iptables.  As a matter of course, we
>> use a similar approach to block rapid failed login attempts on servers with
>> public facing ssh.  It works very well.
>>
>> -Jerry
>>
>> Jerry Champlin
>> Absolute Performance Inc.
>> Phone: 303-565-4401
>> --
>> Enabling businesses to deliver critical applications at lower cost and
>> higher value to their customers.
>>
>>
>>
>> On Tue, Mar 13, 2012 at 2:57 AM, fred hu <[email protected]> wrote:
>>>
>>> Hi, All
>>>
>>> We are using haproxy since 2009 for LB.
>>>
>>> Recently we encountered some malicious clients sending request on same
>>> URL with especially high rate ( 100r/s and lasting for some minutes)
>>> Is there any possibility to block such user while keep serving the normal
>>> clients? (Surly We have no idea on malicious users ip before (s)he attacks)
>>> I read the configuration manual and find we have
>>> fe_sess_rate/be_sess_rate ACLs. But it seems for all clients.
>>>
>>> So, my question here is : Can we find/block a malicious user based on his
>>> request rate?
>>>
>>> Thx!
>>>
>>> --
>>> Fred Hu
>>> Best Regards
>>>
>>
>

Reply via email to