Since I originally posted this. I ported my servers to a new VPS. There was no real way to avoid the attacks on the VPS. Ideally I need to port my servers to a dedicated machine with an IDS infront to filter the blighters out. Soft-based solutions woul still take a hit on performance.
On Apr 26, 3:35 pm, cd34 <[email protected]> wrote: > On Apr 26, 4:19 pm, Haron Media <[email protected]> wrote: > > > Anyways, so I was wondering how soon before the botnets start deploying > > slowloris. Seems like they already have. > > So far, every machine we've checked that was hitting the machine with > slowloris is running linux. Since Windows can't handle more than 130 > sockets, its usefulness in slowloris is questionable. It does appear > that one of the botnet payloads that runs on compromised linux > machines does have the python code. Now if I could just find an IP or > two in the USA that was involved. :) > > -- > You received this message because you are subscribed to the Google Groups > "pylons-discuss" group. > To post to this group, send email to [email protected]. > To unsubscribe from this group, send email to > [email protected]. > For more options, visit this group > athttp://groups.google.com/group/pylons-discuss?hl=en. -- You received this message because you are subscribed to the Google Groups "pylons-discuss" group. To post to this group, send email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/pylons-discuss?hl=en.
