Announcement

Collapse
No announcement yet.

server load arrive 650% (cause is a website)

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • #16
    For me this was mod_security, with the Atomic/gotroot rules.

    The specific rule was:

    #protocol violation
    SecRule REQUEST_METHOD "POST" "deny,status:403,t:none,chain,rev:2,id:390616,rev: 2,phase:2,msg:Atomicorp.com UNSUPPORTED DELAYED Rules: POST request must have a Content-Length header,severity:4"
    SecRule &REQUEST_HEADERS:Content-Length "@eq 0" t:none

    At file 10_asl_rules.conf

    What hackers try to do is upload zip files with phishing sites, using the dvmessages.php . They use many different ips, and they try to upload dozen of files.

    This happens on that rule, and because mod_security have configured the:
    SecResponseBodyAccess On

    This makes a very big load on apache and server, taking values to 650 of load and more, if you dont stop it.

    You can prevent this, puting this rule on top of your mod_security rules:
    SecRule REQUEST_URI "dvmessages.php" "id:220,nolog,drop"

    (id: 200, because it needs to be the first rule to be read by apache)

    Comment

    Working...
    X