On 6/24/2015 11:12 AM, Willy Tarreau wrote:
> The problem with configs posted on a blog is that people blindly copy-paste
> them without understanding and then break a lot of things and ask for help.
> Baptiste takes care of explaining how things work so that people can pick
> what they need. There's no universal anti-ddos config, we've built a lot of
> different ones in the past. Each config is almost unique in fact, depending
> on business cases. You need to keep in mind that fighting DDoS consists in
> differenciating what looks like a regular visitor *in your case* and what
> is not. Quite commonly it's extremely tricky and even between various
> applications hosted behind the same LB you can apply different mechanisms.
> For example for certain apps it's totally abnormal to have more than X
> concurrent connections from a single IP address while in other cases it's
> normal, even to have a lot of requests using a same cookie (think completion
> for example).
> 
> So it is important to understand the concepts, how the tools work and can
> help, then to analyse what happens in your situation and how to fight when
> the problem happens. You'll even notice that you'll change your protections 
> from one attack to another.

I always treat sample configs as a starting point that will need
significant tweaking for my specific situation.  For instance, I already
know that 10 connections from one IP address won't be enough for several
of our websites, partly because there are some customers who have
several users in one location who will almost certainly be connecting
from the same public IP address.

That said, I know that there are plenty of people out there who will
copy/paste a sample config and expect it to make their bed and fillet
their fish.  I get irritated with those people who won't make an effort
to actually understand what their systems are doing.

For this specific situation, I'm hoping to learn how to successfully
combine the techniques on the blog post into one config without screwing
it up.  If I run into trouble, I will try to solve it on my own before I
come back here to ask for help, and if that's required, I will try to
ask intelligent questions and provide all relevant information at the start.

> The subject is really vast. You could have one week full of training on the
> subject and still feel naked at the end.

I've gotten that impression.  I use a number of other open source
projects which have even steeper learning curves.  The basics of haproxy
were quite easy to grasp, but I know that there's a lot of unexplored
depth, some of which I may never use.

Thank you for everything you do.  You are one of the unsung heroes who
make the guts of the Internet possible.

Shawn


Reply via email to