While I think the correct answer is YES (perhaps by implementing a custom 
filter), I guess the answer is going to be "use a reverse proxy".

 
 

Sent: Tuesday, December 18, 2018 at 6:16 PM
From: "Marco Neumann" <[email protected]>
To: [email protected]
Subject: blocking IP to prevent malicious sparql queries
is it possible to block indiviual IPs with the shiro.ini?

We receive a number of malicious sparql queries from an IP in France
(193.52.210.70) today

that continuously issues the following SPARQL query:

SELECT ?r (count(*) AS ?count)
WHERE{ ?x ?r ?s
{ SELECT ?s WHERE
{ ?s a ?o }
OFFSET 124639 LIMIT 1000 }
} GROUP BY ?s ?r OFFSET 0 LIMIT 10000

resulting in:

[2018-12-18 18:10:31] AbstractConnector WARN
java.lang.OutOfMemoryError: GC overhead limit exceeded
[2018-12-18 18:10:34] Fuseki WARN [424] RC = 500 : GC overhead limit
exceeded
java.lang.OutOfMemoryError: GC overhead limit exceeded
[2018-12-18 18:10:34] Fuseki INFO [424] 500 GC overhead limit exceeded
(39.946 s)

and pushes fuseki offline for a few minutes.


--


---
Marco Neumann
KONA

Reply via email to