| /* not related with my previous inquieries */
i am creating a website and would like to learn more about
section 1j of abuse.htm. what is the difficultie in seting
up these scripts? as i can see it is quite easy to do. or
am i wrong? simple ADD TO ABUSE DATABASE and dissalow
access. just check on each page forIP and compare with
ABUSE DB? no? if password USED TO allow access to website
simply ban user for 24 hours and send email stating the
reason. no? I USE .asp not .php currently but the
implementation is the same. what i was wondering any way
of doing this with a session variable? is it possible to
limit acces by using a session variable when people use
HTT or other offline browsers. and another not so easy
way - how to check for traffic so if SERVER max conection
is around 50k and user is using HTT with max 10 simult.
connections he would not get banned!? banning would just
occur for serious abusers!?
on a more personal note i think that all sites that
provide information should have a DB that can be
downloaded with all text on the site (this is possible to
do with other types of documents not just .txt) by
accessing just one file. it can also be many DB's (sorted
by text topics). when i say DATABSAE here i also mean
on .zip and .rar etc.. files that allow users of
downloading information and reading it offline :)
your thoughts?everyones thoughts?
--
included section 1j of abuse.htm
<http://www.httrack.com/html/abuse.html>
--
Use technical tricks to temporarily ban IPs
Good: Efficient
Bad: Radical (your site will only be available online for
all users), not easy to setup
How to to: Create fake links with "killing" targets
Example: Use things like <a
href="killme.cgi"><nothing></a> (again an example in php:)
<?php
// Add IP.
add_temp_firewall_rule($REMOTE_ADDR,"30s");
?>
function add_temp_firewall_rule($addr) {
// The chain chhttp is flushed in a cron job to
avoid ipchains overflow
system("/usr/bin/sudo -u root /sbin/ipchains -I 1
chhttp -p tcp -s ".$addr." --dport 80 -j REJECT");
syslog("user rejected due to too many copy
attemps : ".$addr);
}
| |