Return-Path: Delivered-To: apmail-perl-modperl-archive@perl.apache.org Received: (qmail 23947 invoked by uid 500); 8 May 2003 01:34:33 -0000 Mailing-List: contact modperl-help@perl.apache.org; run by ezmlm Precedence: bulk list-help: list-unsubscribe: list-post: Delivered-To: mailing list modperl@perl.apache.org Received: (qmail 23917 invoked from network); 8 May 2003 01:34:32 -0000 Message-ID: <3EB9B42A.6040906@stason.org> Date: Thu, 08 May 2003 11:34:34 +1000 From: Stas Bekman Organization: Hope, Humanized User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.1) Gecko/20020826 X-Accept-Language: en-us, en MIME-Version: 1.0 To: Perrin Harkins Cc: Gerd Knops , modperl@perl.apache.org Subject: Re: Strategy against 'trivial' DOS attacks? References: <364D49BC-80EA-11D7-89A0-00039363AEBE@bitart.com> <3EB9AA2A.2060007@stason.org> <1052356594.3235.22.camel@localhost.localdomain> Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Rating: daedalus.apache.org 1.6.2 0/1000/N Perrin Harkins wrote: > In addition to the timeout setting Stas pointed out, you should consider > running with the recommended front-end proxy configuration: > http://perl.apache.org/docs/1.0/guide/strategy.html > > You can run hundreds of apache children on a front-end proxy server, > since they are very lightweight. Also, if you are running modperl 2.0 with worker mpm, you can have a single server with just a few Perl interpreters and many many light threads. p.s. Gerd, your spam protection is flawed, the auth challenge email triggers a second challenge. __________________________________________________________________ Stas Bekman JAm_pH ------> Just Another mod_perl Hacker http://stason.org/ mod_perl Guide ---> http://perl.apache.org mailto:stas@stason.org http://use.perl.org http://apacheweek.com http://modperlbook.org http://apache.org http://ticketmaster.com