-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
On 5/20/15 4:22 AM, javalishixml wrote: > More detail information as below: > > presudo-code step: This isn't pseudo-code. This is a re-statement of your problem. > 1. a register page named "http://mywebsite.com/register1.jsp" is > set up, and this page contains a CAPTCHA image You didn't mention that CAPTCHA was already being used. Someone mentioned using it as a solution to your problem. What CAPTCHA are you using? Perhaps using a more effective one would help more than anything else. > 2. the robot(crackers) could successfully register the thousands > different users for this web site during only several minutes. > > 3. if it is a human beings, these thousands different users should > have different IPs. But we find these thousands different users > are from same IPs. No chance these are AOL users? Google for "AOL ip address proxy". > By the way, we get the IP from HttpServletRequest header. Where else would you get the remote IP address? > 4. later, we setup a new register page. We change its url from > "http://mywebsite.com/register1.jsp" to > "http://mywebsite.com/register2.jsp" Are you trying to be evasive? Why have you moved your registration page? > For the first several days, we find everything is good. > > But after several days, we find the robot(crackers) find this new > URL and could successfully register the thousands different users > for this web site during only several minutes. > > It's just reproduced steps for our issue. So, back to my original question: How are you going to identify a "duplicate" request? Show some pseudo-code. > Our requirements are that: 1. we have a URL for register page. we > don't want the thousands different users with same IP could > successfully registered during a very short time window. What about users behind proxies? Are you okay shutting them out? See the AOL anecdote above. > 2. We can have a policy to set an interval time window. Based on > this interval time window, the same IP should NOT register users > again and again. > > 3. This policy should manage a group of URLs. We can always add > the different URLs for this policy. Because based on our > maintaining activities, we may set up many different register page > again and again. > > > Is it a DDOS attack? Are they preventing anyone else from using your site? Or are they just raising their numbers quickly enough that statistically, they always overwhelm your legitimate users and "win" the "lottery"? > Is there a good way to resolve it at httpd level? Seriously, look-up mod_qos, mod_evasive, and mod_security and stop asking for solutions. We've already given you a whole bunch of ideas that consultants would have already bankrupted you for. Go do some work. - -chris -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 Comment: GPGTools - http://gpgtools.org iQIcBAEBCAAGBQJVXIVxAAoJEBzwKT+lPKRY3AMQAIWrelhsrB9WnB8c+Wq7S2ia +L1dU+ZTI+VEeFBWy1ARUTtXM/viL7mE7QfofVVEjmMYAxrITrk9Nqn0DzmGBJAG JNcPkSHVAvhH9thOJDCfLvD69hV5sGCJdNC6RlYn235IEiai1IhH6ZQudrCXAPjl mMjZPX30W65MbA7fBMWG4NUJFi2BBz07zV8/teIwHQ/3w9fTs63o18alRwP5cGUk i1yu0lBf63xO5r7xnS5jN9fvklZe6FrCS+6RK2AAj2viF7mGi3kmaco1fdSQmTLY rdadMd0M9P6BgowMtBUAVNX4DnqJc2GIo8xlCySC/myvp8y3T9vwOvyRERoSW+8h a7oEPV6SKlFYKLHNg0XVgmkT3PHTjqojh2eOlKh8vO3W5YTw2R3xqXa4WUN0dHur cbD2RjSm7mA0Ewl+E2YsCbJAdfuPt3w77mIuv3FaV6ZPWdXLtSq0QARfGju0S11x bdEBaOzsQsm29qOC5MKMqG0tgHlY1Ya3BnGGxI+GTMat91d8kp92ufWeS5bmda3I BqOosM+GkgY9P1DATPXpR5A8Xi5Pp/lgkD4MYVNka2VH7FgKWckXlUhWoilDqFDX k4R9z/ZaRrDwqt6lwSAlRN4znwTw0OyP9FSLGr+VIKfKRUyweJss6pVUUGpxd3yQ ytK9Cbw2UpbOyFaiA1AE =CHtu -----END PGP SIGNATURE----- --------------------------------------------------------------------- To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org For additional commands, e-mail: users-h...@tomcat.apache.org