Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 03 Jul 2015 17:57:25 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   [Bug 201306] patch for www/mod_evasive
Message-ID:  <bug-201306-13@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=201306

            Bug ID: 201306
           Summary: patch for www/mod_evasive
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Many People
          Priority: ---
         Component: Individual Port(s)
          Assignee: freebsd-ports-bugs@FreeBSD.org
          Reporter: w.litter@aon.at
                CC: kiwi@oav.net
                CC: kiwi@oav.net
             Flags: maintainer-feedback?(kiwi@oav.net)

This is no update, but will unbreak this port:

patch-mod_evasive20.c

--- mod_evasive20.c.orig    2015-07-03 17:42:29 UTC
+++ mod_evasive20.c
@@ -139,11 +139,11 @@ static int access_checker(request_rec *r
       time_t t = time(NULL);

       /* Check whitelist */
-      if (is_whitelisted(r->connection->remote_ip)) 
+      if (is_whitelisted(r->connection->client_ip)) 
         return OK;

       /* First see if the IP itself is on "hold" */
-      n = ntt_find(hit_list, r->connection->remote_ip);
+      n = ntt_find(hit_list, r->connection->client_ip);

       if (n != NULL && t-n->timestamp<blocking_period) {

@@ -155,14 +155,14 @@ static int access_checker(request_rec *r
       } else {

         /* Has URI been hit too much? */
-        snprintf(hash_key, 2048, "%s_%s", r->connection->remote_ip, r->uri);
+        snprintf(hash_key, 2048, "%s_%s", r->connection->client_ip, r->uri);
         n = ntt_find(hit_list, hash_key);
         if (n != NULL) {

           /* If URI is being hit too much, add to "hold" list and 403 */
           if (t-n->timestamp<page_interval && n->count>=page_count) {
             ret = HTTP_FORBIDDEN;
-            ntt_insert(hit_list, r->connection->remote_ip, time(NULL));
+            ntt_insert(hit_list, r->connection->client_ip, time(NULL));
           } else {

             /* Reset our hit count list as necessary */
@@ -177,14 +177,14 @@ static int access_checker(request_rec *r
         }

         /* Has site been hit too much? */
-        snprintf(hash_key, 2048, "%s_SITE", r->connection->remote_ip);
+        snprintf(hash_key, 2048, "%s_SITE", r->connection->client_ip);
         n = ntt_find(hit_list, hash_key);
         if (n != NULL) {

           /* If site is being hit too much, add to "hold" list and 403 */
           if (t-n->timestamp<site_interval && n->count>=site_count) {
             ret = HTTP_FORBIDDEN;
-            ntt_insert(hit_list, r->connection->remote_ip, time(NULL));
+            ntt_insert(hit_list, r->connection->client_ip, time(NULL));
           } else {

             /* Reset our hit count list as necessary */
@@ -205,27 +205,27 @@ static int access_checker(request_rec *r
         struct stat s;
         FILE *file;

-        snprintf(filename, sizeof(filename), "%s/dos-%s", log_dir != NULL ?
log_dir : DEFAULT_LOG_DIR, r->connection->remote_ip);
+        snprintf(filename, sizeof(filename), "%s/dos-%s", log_dir != NULL ?
log_dir : DEFAULT_LOG_DIR, r->connection->client_ip);
         if (stat(filename, &s)) {
           file = fopen(filename, "w");
           if (file != NULL) {
             fprintf(file, "%ld\n", getpid());
             fclose(file);

-            LOG(LOG_ALERT, "Blacklisting address %s: possible DoS attack.",
r->connection->remote_ip);
+            LOG(LOG_ALERT, "Blacklisting address %s: possible DoS attack.",
r->connection->client_ip);
             if (email_notify != NULL) {
               snprintf(filename, sizeof(filename), MAILER, email_notify);
               file = popen(filename, "w");
               if (file != NULL) {
                 fprintf(file, "To: %s\n", email_notify);
-                fprintf(file, "Subject: HTTP BLACKLIST %s\n\n",
r->connection->remote_ip);
-                fprintf(file, "mod_evasive HTTP Blacklisted %s\n",
r->connection->remote_ip);
+                fprintf(file, "Subject: HTTP BLACKLIST %s\n\n",
r->connection->client_ip);
+                fprintf(file, "mod_evasive HTTP Blacklisted %s\n",
r->connection->client_ip);
                 pclose(file);
               }
             }

             if (system_command != NULL) {
-              snprintf(filename, sizeof(filename), system_command,
r->connection->remote_ip);
+              snprintf(filename, sizeof(filename), system_command,
r->connection->client_ip);
               system(filename);
             }

-- 
You are receiving this mail because:
You are the assignee for the bug.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-201306-13>