Yes.. I have configured Vhosts for port 443..
On Fri, Jul 26, 2013 at 2:56 PM, Michael D. Wood m...@itsecuritypros.orgwrote:
**
Do you have a virtual host configured for the site SSL/443?
On 07/26/2013 05:15 AM, Yuvapriya s wrote:
Hi
We had done split deployment of apache and tomcat
Was it just an IP exhausting the apache service with too many connections?
What do you see in the access logs? I use OSSEC HIDS on my apache servers to
mitigate this.
In the access log I see the same IP made many requests during the
service interruption and I think that exhausted the
You can always compile from source ;)
What version of Apache are you running?
On 07/29/2013 02:59 AM, Grant wrote:
Was it just an IP exhausting the apache service with too many
connections? What do you see in the access logs? I use OSSEC HIDS on
my apache servers to mitigate this.
In the
The only reason I asked was because I had done this before and had
the virtualhost created for port 443 but forgot to a2ensite on the
virtualhost.
On 07/29/2013 02:59 AM, Yuvapriya s wrote:
Yes.. I
have configured Vhosts for port 443..
On Fri, Jul 26, 2013 at 2:56
PM, Michael D. Wood
Also, you should be able to limit simultaneous client connections with
your firewall and pass the traffic in a syn proxy state. There are
numerous ways to achieve this.
On 07/29/2013 03:18 AM, Michael D. Wood wrote:
You can always compile from source ;)
What version of Apache are you running?
I'm looking for the erorr in this config :
KeepAlive OnServerName server1.domain1.localServerAdmin
me@domain1.localListen 10.10.10.10:80 httpProxy
balancer://cd107d9706d71153bafd4ab15f1c6b5d
BalancerMember http://server1.domain2.local
status=-SE/ProxyVirtualHost 10.10.10.10:80
You can always compile from source ;)
What version of Apache are you running?
I'm running 2.2.25.
- Grant
Was it just an IP exhausting the apache service with too many
connections? What do you see in the access logs? I use OSSEC HIDS on my
apache servers to mitigate this.
In the
Also, you should be able to limit simultaneous client connections with your
firewall and pass the traffic in a syn proxy state. There are numerous ways
to achieve this.
Is that the best way to go besides OSSEC HIDS? I can imagine that
sort of thing could cause problems.
- Grant
You can
You wouldn't keep a syn proxy rule enabled all the time; only under a
DoS attack. You could also implement ModSecurity.
On 07/29/2013 02:07 PM, Grant wrote:
Also, you should be able to limit simultaneous client connections
with your
firewall and pass the traffic in a syn proxy state. There
I'm a bit confused about the requirements for Apache 2.4.6. This page seems
very clear :
http://www.apache.org/dist/httpd/Announcement2.4.html
There is states that This release requires the Apache Portable Runtime
(APR)
version 1.4.x and APR-Util version 1.4.x
The page for the Apache
10 matches
Mail list logo