>> That is the source IP address, which is required for routing replies
>> (including those during the "connect" flow) back to the client, so I don't
>> see how this can be 0 simply because of something the client is doing
>> (other
>> than triggering some sort of bug on the server side, of course).
>>
> scanning for an open proxy, the :: would grab the ip address and the proxy
> would then be in it's use to route content that may not be legitimately sent
> to the destination. or content that it is criminal to even possess. [ child
> porn jumps to mind for an example. ]
> I suspect that the client is a bot doing a scan for an open proxy, one
> handing the :: out for that purpose. or, since it causes the 100% cpu load,
> it's the beginnings of a new ddos attack mechanism. we all may need to
> explicitly deny unspecified ip addresses from server access right quick.

Do you have any theories about the moon landing?

-- 
Eric Covener
cove...@gmail.com

---------------------------------------------------------------------
The official User-To-User support forum of the Apache HTTP Server Project.
See <URL:http://httpd.apache.org/userslist.html> for more info.
To unsubscribe, e-mail: users-unsubscr...@httpd.apache.org
   "   from the digest: users-digest-unsubscr...@httpd.apache.org
For additional commands, e-mail: users-h...@httpd.apache.org

Reply via email to