Yeah, I know, switch to nginx.

But does the Rocket server have any black-listing facility for source IPs 
that seem abusive?

I currently only support GET and POST, so HEAD requests aren't from my 
legitimate users.

And my httpserver.log shows a 2 minute period of 1 IP trying GET 
/user/login at about twice a second (speed typist, no doubt).

Or is this the sort of thing that would be done in a firewall, except that 
firewalls don't know what URLs mean?

/dps

-- 
Resources:
- http://web2py.com
- http://web2py.com/book (Documentation)
- http://github.com/web2py/web2py (Source code)
- https://code.google.com/p/web2py/issues/list (Report Issues)
--- 
You received this message because you are subscribed to the Google Groups 
"web2py-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to