Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 01 Oct 2009 02:40:48 +0200
From:      Thomas Rasmussen <thomas@gibfest.dk>
To:        freebsd-security@freebsd.org
Subject:   Re: Update on protection against slowloris
Message-ID:  <4AC3FA90.1000405@gibfest.dk>
In-Reply-To: <4AC37D6B.3060409@optiksecurite.com>

index | next in thread | previous in thread | raw e-mail

Martin Turgeon wrote:
> Hi list!
>
> We tested mod_antiloris 0.4 and found it quite efficient, but before 
> putting it in production, we would like to hear some feedback from 
> freebsd users. We are using Apache 2.2.x on Freebsd 6.2 and 7.2. Is 
> anyone using it? Do you have any other way to patch against Slowloris 
> other than putting a proxy in front or using the HTTP accept filter?
>
> Thanks for your feedback,
>
> Martin
> _______________________________________________
> freebsd-security@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-security
> To unsubscribe, send any mail to 
> "freebsd-security-unsubscribe@freebsd.org"
Hello,

I am using it succesfully although not under any serious load, same
Apache and FreeBSD versions. I found it easy (compared to the
alternatives) and efficient, and no I don't know of any other ways of
blocking the attack, short of using Varnish or similar. However,
accf_http doesn't help at all, since HTTP POST requests bypass the
filter. HTTP POST can be enabled by passing the -httpready switch to
Slowloris.

Please report back with your findings, I've been wondering how it
would perform under load.

Best of luck with it,

Thomas Rasmussen


home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4AC3FA90.1000405>