btw the following configuration with ip and client.ip instead does not work too:

if ((req.url ~ "(wp-login.php|xmlrpc.php)")) {
if(throttle.is_allowed("ip:" + client.ip, "10req/s") > 0s) {
error 429 "Calm down";
shield.conn_reset();
}
}


On 04/15/2016 10:33 AM, [email protected] wrote:
I am using the following implementation to limit the attack to wp-login.php and xmlrpc.php, but when I test with apache benchmark (or there is an attack) from 1000 concurrent requests with the following configuration only 5 requests are failed from 1000 :

if ((req.url ~ "(wp-login.php|xmlrpc.php)")) {
   if(throttle.is_allowed("host:" + req.http.host, "10req/s") > 0s) {
   error 429 "Calm down";
   shield.conn_reset();
}
}

Is this a normal behavior and why so little number of requests is blocked? Is there an info that describe how these requests are handled and solution of this problem? If I set the throttle to 1 requests it works but this is super stupid and I can't understand why on 10 requests/s limit the throttle does nothing. If I can't solve this issue I should change the varnish with something other so I will be really thankfull if you help with this.


_______________________________________________
varnish-misc mailing list
[email protected]
https://www.varnish-cache.org/lists/mailman/listinfo/varnish-misc

Reply via email to