[42688] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Pattern matching odd HTTP request

daemon@ATHENA.MIT.EDU (E.B. Dreger)
Tue Sep 18 21:22:43 2001

Date: Wed, 19 Sep 2001 01:21:21 +0000 (GMT)
From: "E.B. Dreger" <eddy+public+spam@noc.everquick.net>
To: Bill McGonigle <mcgonigle@medicalmedia.com>
Cc: Jake Khuon <khuon@GBLX.Net>,
	"Karsten W. Rohrbach" <karsten@rohrbach.de>, mike@biggorilla.com,
	nanog@merit.edu
In-Reply-To: <B49B3647-AC88-11D5-9707-003065EAE3C0@medicalmedia.com>
Message-ID: <Pine.LNX.4.20.0109190114230.14290-100000@www.everquick.net>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu


> Date: Tue, 18 Sep 2001 18:58:42 -0400
> From: Bill McGonigle <mcgonigle@medicalmedia.com>

[ snip ]

> On Apache 1.3, this brings the number of httpd processes up to 

[ snip ]

Jake, what server OS?  Iff FreeBSD >= 4.0, check out the man page
for accf_http(9).  Consider hacking Ap to use it... accept(2)
won't even see the connection until the socket is valid.  I don't
know what the timeout is, but that'll help prevent Ap from
forking just to generate 408s.

Disclaimer:

I've not used accf_http on Ap.  It seems to work well on some R&D
work that I've done, although I've not tested the stock accf_http
extensively.


Eddy

---------------------------------------------------------------------------
Brotsman & Dreger, Inc. - EverQuick Internet Division
Phone: +1 (316) 794-8922 Wichita/(Inter)national
Phone: +1 (785) 865-5885 Lawrence
---------------------------------------------------------------------------

Date: Mon, 21 May 2001 11:23:58 +0000 (GMT)
From: A Trap <blacklist@brics.com>
To: blacklist@brics.com
Subject: Please ignore this portion of my mail signature.

These last few lines are a trap for address-harvesting spambots.  Do NOT
send mail to <blacklist@brics.com>, or you are likely to be blocked.


home help back first fref pref prev next nref lref last post