As browsers (at least the ones I know) open 2 connections to browse
websites, we could have a look on the hourly stats and estimate this
(under 100 without problem). I never met such problem anyway, the
highest trafic being 120 000 different users/day.
If you really have to face DDOS as said by
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Robert,
On 3/16/15 8:41 AM, Robert Klemme wrote:
On Sun, Mar 15, 2015 at 10:07 AM, Aurélien Terrestris
aterrest...@gmail.com
wrote:
I agree with the NIO connector which gives good results to this
problem. Also, on Linux you can configure
On 3/16/2015 8:41 AM, Robert Klemme wrote:
On Sun, Mar 15, 2015 at 10:07 AM, Aurélien Terrestris aterrest...@gmail.com
wrote:
I agree with the NIO connector which gives good results to this
problem. Also, on Linux you can configure iptables firewall to limit
the number of connections from
Christopher,
there are several questions in the same thread.. The first one about
SlowLoris was answered a long ago (
http://tomcat.10.x6.nabble.com/is-tomcat-6-0-35-vulnerable-to-CVE-2007-6750-td585.html
). On the contrary, for fast connections opening (DOS), we can
configure the firewall in
On Sun, Mar 15, 2015 at 10:07 AM, Aurélien Terrestris aterrest...@gmail.com
wrote:
I agree with the NIO connector which gives good results to this
problem. Also, on Linux you can configure iptables firewall to limit
the number of connections from one IP (
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Aurélien,
On 3/16/15 9:16 AM, Aurélien Terrestris wrote:
As browsers (at least the ones I know) open 2 connections to
browse websites
That number has been bigger than 2 for quite a while, now:
Nemecek wrote:
Hello,
our webapp, that is deployed in Tomcat 8.0.18, was tested positive
as vulnerable to the slow http denial of service: By using a
single computer, it is possible to establish thousands of
simultaneous connections and keep them open for a long time. During
the attack
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Petr,
On 3/14/15 3:32 PM, Petr Nemecek wrote:
Hello,
our webapp, that is deployed in Tomcat 8.0.18, was tested positive
as vulnerable to the slow http denial of service: By using a
single computer, it is possible to establish thousands
Hello,
our webapp, that is deployed in Tomcat 8.0.18, was tested positive as
vulnerable to the slow http denial of service: By using a single computer,
it is possible to establish thousands of simultaneous connections and keep
them open for a long time. During the attack, the server was rendered
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 3/14/2015 12:32 PM, Petr Nemecek wrote:
Hello,
our webapp, that is deployed in Tomcat 8.0.18, was tested positive
as vulnerable to the slow http denial of service: By using a
single computer, it is possible to establish thousands
10 matches
Mail list logo