Subject: Help with DoS attack exhausting Apache server processes
To: None <netbsd-help@netbsd.org, netbsd-users@netbsd.org>
From: Sverre Froyen <sverre@viewmark.com>
List: netbsd-users
Date: 01/10/2005 10:50:07
Hi,

Periodically, we experience what appears to be denial-of-service attacks 
on our Web site where a client (coming from a single IP address) will 
open a connection to the server every couple of seconds but never send 
http requests.  Each new connection places a server process in a 
"reading" state until it times out after (by default) 300 seconds.  It 
is equivalent to starting multiple telnets to port 80 without entering 
any data.   At first, I thought that I could solve this by using the 
Apache module mod_limitipconn (or something similar) to limit the 
number of connections per IP address that Apache allows.  It appears, 
however, that Apache does not provide a handler hook until it has 
received the client request (which never arrives).

I am therefore looking for some way to accomplish the same result 
(limiting the number of TCP connections per IP address) by using some 
type of NetBSD system tool and I am looking for recommendations about 
what tool to use.

Thank you,

Sverre