03-27-2012, 04:22 PM
Ok, so apparently my webserver's address finally got into some lists it didn't need to be in, and it is now getting hammered with vulnerability scanners and the likes, quite often.
I'm taking measures against this because as it's running on a VDS, it's set up to run in a mode that isn't very heavy on RAM but it does spawn a lot of child processes, which makes it so some of the vulnerability scanners can effectively DoS the server by forcing Apache to spawn 300 new instances of itself every second or so. The solution is the ubiquitous request rate limiting that many websites use, and have the warning on them "Please disable any download accelerators or you might get blocked"
Two of you have already been blocked by Apache, someone using RoadRunner in Ohio and someone attending Christopher Newport University. I've removed both blocks, but you both need to turn off your stupid download accelerators, to download 4 maps you made over 30 connections each to the webserver, pointlessly.
The server sits on a gigabit connection and can use every last bit of it, it could packet flood you offline by itself. You're not getting files any faster by using an accelerator, it's uploading just as fast as you can download.
I'm not going to check Apache every hour and cross-reference the access logs with who's been blocked to see if you're a brbu'er or some automated scanner hitting the server, so this is going to serve as the only heads up to everyone.
tl;dr
Nope, read it.
-edit-
And just to make it clear, it is 100% impossible to trigger this block if you're downloading replays or maps in-game. Download accelerators, scanning Apache with an exploit/vulnerability scanner or mashing on F5 on a single page are the only possible ways to trigger it.
I'm taking measures against this because as it's running on a VDS, it's set up to run in a mode that isn't very heavy on RAM but it does spawn a lot of child processes, which makes it so some of the vulnerability scanners can effectively DoS the server by forcing Apache to spawn 300 new instances of itself every second or so. The solution is the ubiquitous request rate limiting that many websites use, and have the warning on them "Please disable any download accelerators or you might get blocked"
Two of you have already been blocked by Apache, someone using RoadRunner in Ohio and someone attending Christopher Newport University. I've removed both blocks, but you both need to turn off your stupid download accelerators, to download 4 maps you made over 30 connections each to the webserver, pointlessly.
The server sits on a gigabit connection and can use every last bit of it, it could packet flood you offline by itself. You're not getting files any faster by using an accelerator, it's uploading just as fast as you can download.
I'm not going to check Apache every hour and cross-reference the access logs with who's been blocked to see if you're a brbu'er or some automated scanner hitting the server, so this is going to serve as the only heads up to everyone.
tl;dr
Nope, read it.
-edit-
And just to make it clear, it is 100% impossible to trigger this block if you're downloading replays or maps in-game. Download accelerators, scanning Apache with an exploit/vulnerability scanner or mashing on F5 on a single page are the only possible ways to trigger it.