You are viewing a plain text version of this content. The canonical link for it is here.
Posted to bugs@httpd.apache.org by bu...@apache.org on 2002/11/27 14:30:51 UTC
DO NOT REPLY [Bug 14891] New: -
Apache should incorporate features against (D)DoS-attacks
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://nagoya.apache.org/bugzilla/show_bug.cgi?id=14891>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND
INSERTED IN THE BUG DATABASE.
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=14891
Apache should incorporate features against (D)DoS-attacks
Summary: Apache should incorporate features against (D)DoS-
attacks
Product: Apache httpd-2.0
Version: 2.0.43
Platform: All
OS/Version: All
Status: NEW
Severity: Enhancement
Priority: Other
Component: Core
AssignedTo: bugs@httpd.apache.org
ReportedBy: info@orangexl.com
Apache should incorporate several features to protect it from (D)Dos-attacks.
Such features could be: limiting logfile-size, limiting (peak-)bandwidth and
connections per time-unit and/or ip/addressblock.
With the fast growing number of broadband connections, client-side bandwidth is
growing faster as server-side bandwidth and capability. Thus making HTTP-
services more vulnerable to such attacks.
While third-party and commercial solutions are availeble, these can be very
expensive or not actively maintained. Also, such security features should be
availeble after a basic installation.
---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org