Hi,

I've had a quick look in the archives, but haven't seen anything that
addresses my question.

I've got a web site behind a pound proxy that's subject to the occasional
DOS attack.  I'm looking for a means of limiting the affect of these attacks.

I've got various linux iptables rules applied on the pound server that,
amongst other things limit the number of concurrent connections from any
given source IP address (the iptables connlimit module).  These has proved
very effective.  What I'd unable to do is control traffic based on the
rate at which requests are issued on a given connection.

Unless I'm missing something, pound doesn't seem to have this
functionality (I'm using 2.4.3 from Denian Lenny).

If that's the case, then here's my wishlist:

 o limit requests on a given connection to X/interval.  When this is
   exceeded the connection should either:

    (a) be dropped and a syslog message logged (this would allow
        me to catch the log entry and update iptables to blackhole
        the source) or

    (b) throttled to Y/requests per interval, or delayed by sleeping
        for Z seconds between requests.  I think this would be a more
        effective means of tackling the problem.

 o Enforce a maximum session lifetime.  Pound doesn't seem to take any
   notice of the KeepAlive timers returned by the downstream web servers
   (running apache).  The ability to limit a particular incoming
   connection to N seconds or R requests would force a higher turnover
   of connections which would enable the iptables rules I've got in place
   to more easily spot abusers.

Does this look feasible?  I'd offer to write this up myself, but it's been
a long time since I did any significant coding.


-Ronan


--
To unsubscribe send an email with subject unsubscribe to [email protected].
Please contact [email protected] for questions.

Reply via email to