RE: Working Anti Ddos Script In Php 03-11-2016, 02:18 AM
#11
Does someone still use PHP DDOS mitigation scripts today when alternatives that are much better (cloudflare) are available ?
Working Anti Ddos Script In Php filter_list | |
(03-11-2016, 02:18 AM)Loki123 Wrote: Does someone still use PHP DDOS mitigation scripts today when alternatives that are much better (cloudflare) are available ?
(03-11-2016, 12:03 PM)Aiko Wrote: free cloudflare doesnt work well against layer 7 attacks, and its always handy to have some extra security
(03-11-2016, 08:32 PM)Loki123 Wrote: Layer 7 attack vendors are usually if not always the developers fault or the applications fault. For example Apache and slowloris.
Most layer 7 attacks can be easily mitigated with a firewall rule and so on. Php should never be used, causes more harm than good in a situation where you are actually attacked.
(03-11-2016, 08:34 PM)Angel Beats Wrote: Erm actually most Layer 7 attacks are NOT the fault of the developers. As long as your packets look like a real users packets you will still use a lot of valuable resources.
(03-12-2016, 12:11 AM)Loki123 Wrote: *Developers and system administrators fault.*
I assume you are talking about a Layer 7 attack where a button is pressed repeatedly and so on. Thus; Completely legitimate packet that is repeated over and over again. It is quite simple to mitigate those with a simple iptables rules set. Just limit how many connections each IP address can make to your server per X seconds, if the IP address sends say 600 requests per second (hypothetical) and your limit is 500 per second he will be banned from making further requests for the next hour or so. As soon as these packets aren't reaching the web page, it doesn't do much more harm than trying, badly, to fill up your bandwidth.
That is just one example of a mitigation that works.
(03-12-2016, 12:17 AM)meow Wrote: You obviously have no idea how real application-layer floods work in the wild.
(03-12-2016, 12:46 AM)Loki123 Wrote: No, no, obviously I don't. Not that I have owned anything larger than a bittorrent site that currently has about 50,000 torrents, 60,000 users and the largest one ever in my country that was constantly under these type of attacks.. Nor have I applied these kind of techniques myself over the years.. Obviously I have no real experience with this.
Oh, wait, I did and I have! Fuck....
(03-16-2016, 05:36 AM)meow Wrote: Even if everything you said in that post was true (probably isn't, but let's say it was true for the sake of this post), it doesn't change the fact that most actual application layer floods are performed by people who know what they're doing and/or sophisticated scripts to do it for them. Your claim that mitigating layer-7 floods is easy because it's all going to be from the same IP is completely false. Even skids know that the requests in an l7 flood are (or should be, at least) sent from different IP address to avoid that kind of mitigating. Furthermore, the requests sent in the attack aren't all the same, otherwise you're right, it would be easy to mitigate. But that's just not how the world works.
If you don't believe me or still think I'm wrong, go look at some packet captures from victims of actual layer-7 floods. I hate to sound arrogant, but you'll find that I'm right.