aboutsummaryrefslogtreecommitdiff
path: root/network/mod_evasive
diff options
context:
space:
mode:
authorB. Watson <yalhcru@gmail.com>2022-03-14 02:58:40 -0400
committerB. Watson <yalhcru@gmail.com>2022-03-14 02:58:40 -0400
commit6d9d74c6aad4876bfeffb0c330b443ae3804fc35 (patch)
treec7550c3d92c8ffbc043cf03c380a98a5414c514c /network/mod_evasive
parent2dba874f2af952a00d0d0a37bd1a029a71b157dd (diff)
network/mod_evasive: Wrap README at 72 columns.
Signed-off-by: B. Watson <yalhcru@gmail.com>
Diffstat (limited to 'network/mod_evasive')
-rw-r--r--network/mod_evasive/README27
1 files changed, 15 insertions, 12 deletions
diff --git a/network/mod_evasive/README b/network/mod_evasive/README
index deac6b184a294..8cf21dc1382f3 100644
--- a/network/mod_evasive/README
+++ b/network/mod_evasive/README
@@ -1,22 +1,25 @@
-mod_evasive maneuvers module for Apache to provide evasive action in the event
-of an HTTP DoS or DDoS attack or brute force attack. It is also designed
-to be a detection and network management tool, and can be easily configured
-to talk to ipchains, firewalls, routers, and etcetera. mod_evasive presently
-reports abuses via email and syslog facilities.
+mod_evasive maneuvers module for Apache to provide evasive action in
+the event of an HTTP DoS or DDoS attack or brute force attack. It is
+also designed to be a detection and network management tool, and can
+be easily configured to talk to ipchains, firewalls, routers, and
+etcetera. mod_evasive presently reports abuses via email and syslog
+facilities.
Detection is performed by creating an internal dynamic hash table of IP
Addresses and URIs, and denying any single IP address from any of the
following:
- * Requesting the same page more than a few times per second
- * Making more than 50 concurrent requests on the same child per second
- * Making any requests while temporarily blacklisted (on a blocking list)
+ * Requesting the same page more than a few times per second
+ * Making more than 50 concurrent requests on the same child per second
+ * Making any requests while temporarily blacklisted (on a block list)
-You'll need to add the following line to your /etc/httpd/httpd.conf file:
+Add the following line to your /etc/httpd/httpd.conf file:
Include /etc/httpd/extra/mod_evasive.conf
To test enter the following command:
perl /usr/doc/mod_evasive-$VERSION/test.pl | more
-which should output some HTTP/1.1 200 OK lines; then HTTP/1.1 403 Forbidden
-mod_evasive is fully tweakable through the Apache configuration file, see
-the README file in the package's documentation directory.
+which should output some "HTTP/1.1 200 OK" lines; then "HTTP/1.1 403
+Forbidden".
+
+mod_evasive is fully tweakable through the Apache configuration file,
+see the README file in the package's documentation directory.