Yeah, I know, switch to nginx. But does the Rocket server have any black-listing facility for source IPs that seem abusive?
I currently only support GET and POST, so HEAD requests aren't from my legitimate users. And my httpserver.log shows a 2 minute period of 1 IP trying GET /user/login at about twice a second (speed typist, no doubt). Or is this the sort of thing that would be done in a firewall, except that firewalls don't know what URLs mean? /dps -- Resources: - http://web2py.com - http://web2py.com/book (Documentation) - http://github.com/web2py/web2py (Source code) - https://code.google.com/p/web2py/issues/list (Report Issues) --- You received this message because you are subscribed to the Google Groups "web2py-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. For more options, visit https://groups.google.com/d/optout.

