On Wed, Jun 24, 2015 at 09:51:36AM -0600, Shawn Heisey wrote:
> I was going to comment on the blog post so the author would see the
> request to put together a complete config with multiple front ends and
> back ends, with all of them using every one of the DDOS techniques
> included on the blog post.  Unfortunately the blog has an unhelpful
> combination of settings -- new user registration is disabled, and login
> is required to comment.

The problem with configs posted on a blog is that people blindly copy-paste
them without understanding and then break a lot of things and ask for help.
Baptiste takes care of explaining how things work so that people can pick
what they need. There's no universal anti-ddos config, we've built a lot of
different ones in the past. Each config is almost unique in fact, depending
on business cases. You need to keep in mind that fighting DDoS consists in
differenciating what looks like a regular visitor *in your case* and what
is not. Quite commonly it's extremely tricky and even between various
applications hosted behind the same LB you can apply different mechanisms.
For example for certain apps it's totally abnormal to have more than X
concurrent connections from a single IP address while in other cases it's
normal, even to have a lot of requests using a same cookie (think completion
for example).

So it is important to understand the concepts, how the tools work and can
help, then to analyse what happens in your situation and how to fight when
the problem happens. You'll even notice that you'll change your protections 
from one attack to another.

> I believe that the author is active on this list, so I hope that they
> are watching,

Yep, that's Baptiste Assmann.

> and can help fill in the gaps for those of us who are less
> familiar with how to use haproxy's advanced features.

The subject is really vast. You could have one week full of training on the
subject and still feel naked at the end. You really need to get dosed and
to deploy some hacks in emergency to start to get into it. In fact everything
that's implemented in the blog article is about how to limit the breakage for
regular visitors. That's why it's so much business-specific.

Regards,
Willy


Reply via email to