Am 24.01.2026 um 20:21 schrieb Lloyd:
> Isn't this why the HTTP 406 response code exists?
> 

It does not matter sending a corresponding HTTP response like:

HTTP 429 Too many requests
Retry-After: some delay

They ignore it and will continue sending requests in ways hardly
detectable. The only option I see is grepping the log file for those
status codes (404, 406, 429, some location, etc.) and use the IP
information for creating pf rules. Having httpd in base do something
like this automatically like e.g. spamd would be a cool feature to have.
Something like: Make httpd detect IPs sending too many requests and make
it manage some pf table to block that IP for some time automatically
similar to spamd.

I am currently helping someone running apache2 and there are quite some
modules available to help getting out of the situation. Currently
testing mod_evasive with very little success. It is very hard to decide
a request is coming from a user or a machine based on the access.log,
for example. So the only information you have is IP and location
accessed. I am saying this after having watched the access.log there for
a couple of days trying to find an access pattern to match against with
the frustrating result that it's nearly impossible to distinguish
between a bot just downloading the site in all possible ways or a ddos
attack. So something like greylisting and dnsbl etc. for httpd may do
the trick.

Regards,
-- 
Christian

Reply via email to