Hi Ryan,

I'm no Apache expert, but AFAICT the req_timeout module is installed.  A
/server-info shows the req_timeout.c module with the RequestReadTimeout
parameter.

Thanks,
GB

On Thu, Apr 14, 2011 at 1:56 PM, Ryan Barnett <[email protected]>wrote:

> Did you install the reqtimeout module?
>
> #
> # Mitigate Slow HTTP POST attacks
> #
> # Must have the mod_reqtimeout module installed
> # You should adjust the RequestReadTimeout body directive setting to a
> limit
> # that will allow any legitimate slow clients or large file uplaods.
> #
> <IfModule reqtimeout_module>
> RequestReadTimeout body=30
> </IfModule>
>
> -Ryan
>
>
>
> From: Guillaume Bilodeau <[email protected]<mailto:
> [email protected]>>
> Date: Thu, 14 Apr 2011 12:33:52 -0500
> To: "[email protected]<mailto:
> [email protected]>" <
> [email protected]<mailto:
> [email protected]>>
> Subject: [Owasp-modsecurity-core-rule-set] Slow HTTP DOS protection not
> behaving as expected
>
> Hi all,
>
> We are trying to setup the OWASP Core Rule Set to protect our application
> from Slow HTTP DOS attacks.
>
> We have setup ModSecurity 2.5.13 on our Apache 2.2.17 instance, loaded the
> module, and included all CRS base rules plus
> modsecurity_crs_11_slow_dos_protection.conf.  We didn't change the settings
> defined in the conf file, so SecReadStateLimit is set to 5 and
> RequestReadTimeout is set to body=30.  We are using the http_dos_cli command
> line tool to do our tests, with the connection parameter set to 500.
>
> When running the slow-headers test, ModSecurity seems to be protecting the
> application correctly, dropping most (all?) requests from the tester's IP
> and allowing requests from a different IP to be served.  However, when
> running the slow-post test, ModSecurity doesn't seem to be doing anything.
>  From what I understand, the test successfully creates the 500 connections
> and keeps them open; none of them are dropped.  Requests coming from a
> different IP are not served and eventually time out.  A tail -f error_log
> shows nothing except the eventual message on MaxClients (set to 300 now)
> being reached.  Interestingly, when we kill the http_dos_cli process, the
> error_log is then flooded with hundreds of entries such as this:
>
>
> [Mon Nov 22 17:44:46 2010] [warn] ModSecurity: Access denied with code 400.
> Too many connections [6] of 5 allowed in READ state from 211.144.112.20 -
> Possible DoS Consumption Attack [Rejected]
>
> (this has been taken from the SpiderLabs blog entry, dates and IPs are
> obviously different)
>
> Any idea on why this isn't behaving like we're expecting it to be?
>
> Thanks!
> GB
>
>
>
_______________________________________________
Owasp-modsecurity-core-rule-set mailing list
[email protected]
https://lists.owasp.org/mailman/listinfo/owasp-modsecurity-core-rule-set

Reply via email to