Return-Path: Delivered-To: apmail-httpd-users-archive@www.apache.org Received: (qmail 29933 invoked from network); 29 Sep 2004 10:35:12 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (209.237.227.199) by minotaur-2.apache.org with SMTP; 29 Sep 2004 10:35:12 -0000 Received: (qmail 81925 invoked by uid 500); 29 Sep 2004 10:33:53 -0000 Delivered-To: apmail-httpd-users-archive@httpd.apache.org Received: (qmail 81837 invoked by uid 500); 29 Sep 2004 10:33:52 -0000 Mailing-List: contact users-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: users@httpd.apache.org list-help: list-unsubscribe: list-post: Delivered-To: mailing list users@httpd.apache.org Received: (qmail 81723 invoked by uid 99); 29 Sep 2004 10:33:51 -0000 X-ASF-Spam-Status: No, hits=-0.0 required=10.0 tests=SPF_HELO_PASS,SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (hermes.apache.org: domain of floeff@arcor.de designates 151.189.20.156 as permitted sender) Received: from [151.189.20.156] (HELO postman.arcor.de) (151.189.20.156) by apache.org (qpsmtpd/0.28) with ESMTP; Wed, 29 Sep 2004 03:33:49 -0700 Received: from [192.168.0.5] (pD95DAFE6.dip.t-dialin.net [217.93.175.230]) (authenticated bits=0) by postman.arcor.de (8.13.0.PreAlpha4/8.13.0.PreAlpha4) with ESMTP id i8TAXjRs022548 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NO) for ; Wed, 29 Sep 2004 12:33:46 +0200 (MEST) Message-ID: <415A8F8A.1050507@arcor.de> Date: Wed, 29 Sep 2004 12:33:46 +0200 From: Florian Effenberger X-Accept-Language: en MIME-Version: 1.0 To: users@httpd.apache.org References: <415A66AC.4080102@arcor.de> <20040929100019.00006eb9@fe-pc-092.int.cinetic.de> <415A71D5.9000809@arcor.de> In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Virus-Checked: Checked Subject: Re: [users@httpd] PHP as CGI: Denial of Service? X-Spam-Rating: minotaur-2.apache.org 1.6.2 0/1000/N Hi, > Nevertheless a very good option. Lets you use the (far more scalable) > Worker MPM, for instance). If my users need PHP, it's not an option at all. ;-) > Loading PHP is the issue. HelloWorld isn't. Is PHP this big and fat that it can so easily bog down a server? > Neither would I. I recently had some attacks on my server, and after > blocking the first few IPs they came from, I hacked up a mini-module > to return /robots.txt to the attackers. But that was something very > specific: for a more general solution you'd want > http://force-elite.com/~chip/archives/mod_load_average-0.1.0-test3.tar.bz2 I'll have a look at it, thanks, but I always think that this works around the problem instead of solving it. :-( Florian --------------------------------------------------------------------- The official User-To-User support forum of the Apache HTTP Server Project. See for more info. To unsubscribe, e-mail: users-unsubscribe@httpd.apache.org " from the digest: users-digest-unsubscribe@httpd.apache.org For additional commands, e-mail: users-help@httpd.apache.org