Return-Path: Delivered-To: apmail-httpd-users-archive@www.apache.org Received: (qmail 12325 invoked from network); 10 Aug 2006 21:13:02 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (209.237.227.199) by minotaur.apache.org with SMTP; 10 Aug 2006 21:13:02 -0000 Received: (qmail 6239 invoked by uid 500); 10 Aug 2006 21:12:53 -0000 Delivered-To: apmail-httpd-users-archive@httpd.apache.org Received: (qmail 6223 invoked by uid 500); 10 Aug 2006 21:12:53 -0000 Mailing-List: contact users-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: users@httpd.apache.org list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list users@httpd.apache.org Received: (qmail 6212 invoked by uid 99); 10 Aug 2006 21:12:53 -0000 Received: from asf.osuosl.org (HELO asf.osuosl.org) (140.211.166.49) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 10 Aug 2006 14:12:53 -0700 X-ASF-Spam-Status: No, hits=0.0 required=10.0 tests= X-Spam-Check-By: apache.org Received-SPF: pass (asf.osuosl.org: local policy) Received: from [69.50.231.8] (HELO darwin.ctyme.com) (69.50.231.8) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 10 Aug 2006 14:12:43 -0700 Received: from bigdog.ctyme.com ([204.95.16.61] helo=[192.168.2.100]) by darwin.ctyme.com with esmtps (TLSv1:AES256-SHA:256) (Exim 4.62) id 1GBHp7-0003OQ-Cu for users@httpd.apache.org; Thu, 10 Aug 2006 14:12:13 -0700 Message-ID: <44DBA12C.7040602@perkel.com> Date: Thu, 10 Aug 2006 14:12:12 -0700 From: Marc Perkel User-Agent: Thunderbird 1.5.0.5 (Windows/20060719) MIME-Version: 1.0 To: users@httpd.apache.org References: <44DB4BCD.9050804@perkel.com> In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Spamfilter-host: darwin.ctyme.com - http://www.junkemailfilter.com X-Virus-Checked: Checked by ClamAV on apache.org Subject: Re: [users@httpd] Conditions based on reverse lookup X-Spam-Rating: minotaur.apache.org 1.6.2 0/1000/N Joshua Slive wrote: > On 8/10/06, Marc Perkel wrote: >> I'm running Apache 2.2. Here's what I want to do. I want to restrict >> access based on a failed reverse host lookup. For example, if the IP of >> the client fails revers lookup I want then to not be able to post. >> >> Can that be done? > > There's probably some module that does this, but a quick hack would be > HostnameLookups On > SetEnvIf Remote_Host [0-9]$ noname=1 > > Order deny,allow > Deny from env=noname > > > This *will* slow down your server. > > Joshua. > I'm already looking up host names and it seems fast enough. How would I do this so that only POST is denied. I'm trying to reduce comment spam on blogs and BBS boards. Thanks in advance. --------------------------------------------------------------------- The official User-To-User support forum of the Apache HTTP Server Project. See for more info. To unsubscribe, e-mail: users-unsubscribe@httpd.apache.org " from the digest: users-digest-unsubscribe@httpd.apache.org For additional commands, e-mail: users-help@httpd.apache.org