You are viewing a plain text version of this content. The canonical link for it is here.
Posted to bugs@httpd.apache.org by bu...@apache.org on 2002/11/27 14:30:51 UTC

DO NOT REPLY [Bug 14891] New: - Apache should incorporate features against (D)DoS-attacks

DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG 
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://nagoya.apache.org/bugzilla/show_bug.cgi?id=14891>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND 
INSERTED IN THE BUG DATABASE.

http://nagoya.apache.org/bugzilla/show_bug.cgi?id=14891

Apache should incorporate features against (D)DoS-attacks

           Summary: Apache should incorporate features against (D)DoS-
                    attacks
           Product: Apache httpd-2.0
           Version: 2.0.43
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: Enhancement
          Priority: Other
         Component: Core
        AssignedTo: bugs@httpd.apache.org
        ReportedBy: info@orangexl.com


Apache should incorporate several features to protect it from (D)Dos-attacks. 
Such features could be: limiting logfile-size, limiting (peak-)bandwidth and 
connections per time-unit and/or ip/addressblock.

With the fast growing number of broadband connections, client-side bandwidth is 
growing faster as server-side bandwidth and capability. Thus making HTTP-
services more vulnerable to such attacks.
While third-party and commercial solutions are availeble, these can be very 
expensive or not actively maintained. Also, such security features should be 
availeble after a basic installation.

---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org