diff options
author | B. Watson <yalhcru@gmail.com> | 2022-03-14 02:58:40 -0400 |
---|---|---|
committer | B. Watson <yalhcru@gmail.com> | 2022-03-14 02:58:40 -0400 |
commit | 6d9d74c6aad4876bfeffb0c330b443ae3804fc35 (patch) | |
tree | c7550c3d92c8ffbc043cf03c380a98a5414c514c /network/mod_evasive | |
parent | 2dba874f2af952a00d0d0a37bd1a029a71b157dd (diff) |
network/mod_evasive: Wrap README at 72 columns.
Signed-off-by: B. Watson <yalhcru@gmail.com>
Diffstat (limited to 'network/mod_evasive')
-rw-r--r-- | network/mod_evasive/README | 27 |
1 files changed, 15 insertions, 12 deletions
diff --git a/network/mod_evasive/README b/network/mod_evasive/README index deac6b184a29..8cf21dc1382f 100644 --- a/network/mod_evasive/README +++ b/network/mod_evasive/README @@ -1,22 +1,25 @@ -mod_evasive maneuvers module for Apache to provide evasive action in the event -of an HTTP DoS or DDoS attack or brute force attack. It is also designed -to be a detection and network management tool, and can be easily configured -to talk to ipchains, firewalls, routers, and etcetera. mod_evasive presently -reports abuses via email and syslog facilities. +mod_evasive maneuvers module for Apache to provide evasive action in +the event of an HTTP DoS or DDoS attack or brute force attack. It is +also designed to be a detection and network management tool, and can +be easily configured to talk to ipchains, firewalls, routers, and +etcetera. mod_evasive presently reports abuses via email and syslog +facilities. Detection is performed by creating an internal dynamic hash table of IP Addresses and URIs, and denying any single IP address from any of the following: - * Requesting the same page more than a few times per second - * Making more than 50 concurrent requests on the same child per second - * Making any requests while temporarily blacklisted (on a blocking list) + * Requesting the same page more than a few times per second + * Making more than 50 concurrent requests on the same child per second + * Making any requests while temporarily blacklisted (on a block list) -You'll need to add the following line to your /etc/httpd/httpd.conf file: +Add the following line to your /etc/httpd/httpd.conf file: Include /etc/httpd/extra/mod_evasive.conf To test enter the following command: perl /usr/doc/mod_evasive-$VERSION/test.pl | more -which should output some HTTP/1.1 200 OK lines; then HTTP/1.1 403 Forbidden -mod_evasive is fully tweakable through the Apache configuration file, see -the README file in the package's documentation directory. +which should output some "HTTP/1.1 200 OK" lines; then "HTTP/1.1 403 +Forbidden". + +mod_evasive is fully tweakable through the Apache configuration file, +see the README file in the package's documentation directory. |