there is a website protected by pf and running apache on a recent openbsd snapshot that needs to be protected against scripting attacks. i can configure both pf and apache to help block this behavior but am not familiar with the best practices for such configurations.

the situation is that a user who authenticates to apache via htpasswd has run a script a number of times in an attempt to mine a database. all of the user activity is already logged by apache and it is crystal clear that scripting is going on. i would like to stop this scripting in its tracks and here is what i am already looking at:

- pf - use max-src-X to stop this behavior and log it at the firewall

- apache - less clear on what tools are best, possibly mod_security stuff

the sort of behavior that suggests scripting is more than ~20 http requests in 120 seconds, in this case all from one ip and using a single apache/htpasswd username.

i'm looking for some guidance both on which dials to set and where to set them. i am already aware of the max-src settings but do not know which ones would be best to set here or a prescription for finding the right numbers to dial in. with apache i am much more clueless and believe that the trouble behavior being limited to a single apache user might be helpful in terms of countermeasures.

cheers,
jake

Reply via email to