Hi,
My system crashed today. It was a good crash: mysql went really down, bind was the following to fall (I use mysql-dlz) and even cron and kernel exploted.
While I was trying to understand what happened, I reboot and it took ages to start. Even "top" was painful slow, and... wow! I got 46.0 load just 1 minute later!
PHP was to blame. I narrowed it down and it seems a big spammer "felt in love" with one of my websites (which runs a blog), and was (and still is) sending a LOT of fake spam requests to the site every second. That collapsed my web server, as apache starts php (in cgi-suexec'd mode) and the blog has to send a webpage (querying mysql in its way) to the spammer.
So, mod_security is a good toy, and this:
Quote:
SecFilterSelective HTTP_Referer "\.bigbig\.com" "nolog"
seems to be an effective way to get rid of that particular spammer. This stops the attack before php is launched and my system runs now at 0.3. I'm still being hit by that spammer, but it makes no harm now. I've also added some other common rules like "penis", "enlarge", "cialis" and so on, so I hope a great % of the spam will be off.
The question... do you know
a) a way to live-update mod_security from maybe an online source (something like spam blacklists postfix uses).
b) a better way to deal with blog spammers?
I can take the b2evo spammer list and transformate it into SecFilterSelective things by hand, but maybe there is some automated way to do this, or a better solution for the problem.
Anyway, my system seems to be more stable now. Hope your websites don't suffer from this!