TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Rack Attack: Protection from abusive clients

92 点作者 ktheory大约 12 年前

6 条评论

noonespecial大约 12 年前
Nice. I was really hoping it protected me from a very different kind of "abusive client" though. I guess there are somethings that even in ruby you can't do easily.
评论 #5646229 未加载
评论 #5645969 未加载
fduran大约 12 年前
iptables can limit the number of connections per ip in a "cheap" (fast/early) way. In fact is my #1 use of iptables since blocking ports where there are no services doesn't do much.
评论 #5646209 未加载
评论 #5646224 未加载
评论 #5646155 未加载
michaelbuckbee大约 12 年前
Maybe I'm missing something, but this seem like something that would only be useful in situations where you don't have access to anything "closer" to the network requests (router, firewall, webserver) that you can tweak to handle these types of things.<p>So it's something that's good for Heroku apps?
评论 #5647041 未加载
评论 #5647558 未加载
评论 #5647069 未加载
评论 #5646842 未加载
jwilliams大约 12 年前
My first question is how this works when you have more than one server.<p>It's not mentioned in the article, but this implementation uses the standard Rails Cache:<p><a href="https://github.com/kickstarter/rack-attack/blob/master/lib/rack/attack/cache.rb" rel="nofollow">https://github.com/kickstarter/rack-attack/blob/master/lib/r...</a><p>There are particular hooks in there for Redis. So if you've got "n" servers, it seems the preferred approach is to use a central Redis store.
gingerlime大约 12 年前
I used fail2ban to block abusive ips (based on string matching of specific errors in our logs). This seems like an interesting alternative though to keep things under one roof.
评论 #5651320 未加载
umsm大约 12 年前
This seems like a vulnerability in their implementation: "configure your proxy to set the X-Forwarded-For header with the source IP"
评论 #5646594 未加载
评论 #5647730 未加载