Mod_evasive And Black List
Jul 9, 2007Some times I read in logs
server mod_evasive[24203]: Blacklisting address 84.255.151.xxx: possible attack.
Where can I find this black list and all IP listed
Some times I read in logs
server mod_evasive[24203]: Blacklisting address 84.255.151.xxx: possible attack.
Where can I find this black list and all IP listed
I have 20 clients who are on different networks and countries but all of the sudden their IP's are keep getting black list in spamhause, CBL, dsbl etc and they can not send email i am so very tired of this,
View 7 Replies View RelatedI've come across a few of my sites on the server at my work that are showing up with Black Diamonds with question marks in them. It seems like just recently have we started having this problem, sites that have been up for a while now without these problems are now having them. What could be the cause of this so that we may look into it?
View 9 Replies View Relatedmy server's Ip adresse was found listed at the CBL list.
check this out :
[url]
i think i'm listed for naming issue as they referred me to this page to solve the problem.
what should i do to correct the probleme i made some changes on /etc/hostname and etc/hosts and requested delisting but without positive results.
I'm On debian SARGE.
I have started having daily numproc black alerts on my VPS. Tech Support have increased the numproc limit already to 1500 but say that I will need a dedicated server, that's the last I have heard. I'd like to know if there is anything I can do to limit this numproc problem without the need to get a dedicated server. The numproc alerts seem to be getting more frequent but the visitors to the site are not increasing. Here are the details:
2 x AMD Opteron(tm) Processor 244, 904.127 MHz, cache size: 1024 KB
Linux 2.6.8-022stab078.21-enterprise #1
Apache/1.3.36 (Unix) mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.4 PHP/4.4.2 FrontPage/5.0.2.2635.SR1.2 mod_ssl/2.8.27 OpenSSL/0.9.7a
Cpanel
Only one site is hosted on the VPS. Includes phpbb forum & various php / mysql sections like an affiliate store & photo gallery. Averaging about 11000 visitors/day
I tried to run /proc/user_beancounters & ps axv commands when the numproc was maxed this morning but could not log in to run it so these are the ones I ran yesterday.
Code:
uid resource held maxheld barrier limit failcnt
132: kmemsize 13786145 13803842 39485440 40632320 0
lockedpages 0 0 1024 1024 0
privvmpages 110039 110045 262144 278528 17
shmpages 731 731 86016 86016 0
dummy 0 0 0 0 0
numproc 683 683 1500 1500 4709595
physpages 62578 62580 0 2147483647 0
vmguarpages 0 0 135168 2147483647 0
oomguarpages 66597 66599 104448 2147483647 0
numtcpsock 47 49 1440 1440 0
numflock 11 11 752 824 0
numpty 1 1 64 64 0
numsiginfo 0 1 1024 1024 0
tcpsndbuf 92552 112604 6881280 10813440 0
tcprcvbuf 692 1384 6881280 10813440 0
othersockbuf 98524 103180 4504320 8388608 0
dgramrcvbuf 0 0 1048576 1048576 0
numothersock 123 123 1440 1440 0
dcachesize 619920 622790 9093120 9666560 0
numfile 2434 2435 23280 23280 0
dummy 0 0 0 0 0
dummy 0 0 0 0 0
dummy 0 0 0 0 0
numiptent 47 47 512 512 0
Code:
PID TTY STAT TIME MAJFL TRS DRS RSS %MEM COMMAND
1 ? Ss 0:00 0 26 1593 552 0.0 init
15751 ? Ss 0:00 0 28 1495 596 0.0 syslogd -m 0
15761 ? S 0:00 0 10 1437 456 0.0 /usr/sbin/courierlogger -pid=/var/spool/authdaemon/pid -facility=mail -start /usr/libexec/courier-authlib/authdaemond
15762 ? S 0:00 0 13 1782 576 0.0 /usr/libexec/courier-authlib/authdaemond
15786 ? S 0:00 0 13 1782 616 0.0 /usr/libexec/courier-authlib/authdaemond
15787 ? S 0:00 0 13 1782 596 0.0 /usr/libexec/courier-authlib/authdaemond
15788 ? S 0:00 0 13 1782 616 0.0 /usr/libexec/courier-authlib/authdaemond
15789 ? S 0:00 0 13 1782 616 0.0 /usr/libexec/courier-authlib/authdaemond
15790 ? S 0:00 0 13 1782 584 0.0 /usr/libexec/courier-authlib/authdaemond
15799 ? Ssl 0:00 8 269 39030 2664 0.0 /usr/sbin/named -u named
15814 ? Ss 0:01 3 296 3711 1704 0.0 /usr/sbin/sshd
15825 ? Ss 0:00 2 138 1933 864 0.0 xinetd -stayalive -pidfile /var/run/xinetd.pid
15836 ? S 0:00 0 573 1570 1068 0.0 /bin/sh /usr/bin/mysqld_safe --datadir=/var/lib/mysql --pid-file=/var/lib/mysql/server.surfing-waves.com.pid
15861 ? Sl 0:01 40 4000 108171 26516 0.7 /usr/sbin/mysqld --basedir=/ --datadir=/var/lib/mysql --user=mysql --pid-file=/var/lib/mysql/server.surfing-waves.com.pid --skip-external-locking
15907 ? S 0:00 0 829 8938 7388 0.2 chkservd
15923 ? S 0:00 0 10 1441 468 0.0 /usr/sbin/courierlogger -pid=/var/run/imapd.pid -start -name=imapd /usr/lib/courier-imap/libexec/couriertcpd -address=0 -maxprocs=40 -maxperip=30 -nodnslookup -noidentlookup 143 /usr/lib/courier-imap/sbin/imaplogin /usr/lib/courier-imap/bin/imapd Maildir
15924 ? S 0:00 0 44 1515 512 0.0 /usr/lib/courier-imap/libexec/couriertcpd -address=0 -maxprocs=40 -maxperip=30 -nodnslookup -noidentlookup 143 /usr/lib/courier-imap/sbin/imaplogin /usr/lib/courier-imap/bin/imapd Maildir
15934 ? S 0:00 0 10 1441 400 0.0 /usr/sbin/courierlogger -pid=/var/run/imapd-ssl.pid -start -name=imapd-ssl /usr/lib/courier-imap/libexec/couriertcpd -address=0 -maxprocs=40 -maxperip=30 -nodnslookup -noidentlookup 993 /usr/lib/courier-imap/bin/couriertls -server -tcpd /usr/lib/courier-imap/sbin/imaplogin /usr/lib/courier-imap/bin/imapd Maildir
15935 ? S 0:00 0 44 1515 492 0.0 /usr/lib/courier-imap/libexec/couriertcpd -address=0 -maxprocs=40 -maxperip=30 -nodnslookup -noidentlookup 993 /usr/lib/courier-imap/bin/couriertls -server -tcpd /usr/lib/courier-imap/sbin/imaplogin /usr/lib/courier-imap/bin/imapd Maildir
15940 ? S 0:00 0 10 1441 472 0.0 /usr/sbin/courierlogger -pid=/var/run/pop3d.pid -start -name=pop3d /usr/lib/courier-imap/libexec/couriertcpd -address=0 -maxprocs=40 -maxperip=30 -nodnslookup -noidentlookup 110 /usr/lib/courier-imap/sbin/pop3login /usr/lib/courier-imap/bin/pop3d Maildir
15941 ? S 0:00 0 44 1515 512 0.0 /usr/lib/courier-imap/libexec/couriertcpd -address=0 -maxprocs=40 -maxperip=30 -nodnslookup -noidentlookup 110 /usr/lib/courier-imap/sbin/pop3login /usr/lib/courier-imap/bin/pop3d Maildir
15946 ? S 0:00 0 10 1441 400 0.0 /usr/sbin/courierlogger -pid=/var/run/pop3d-ssl.pid -start -name=pop3d-ssl /usr/lib/courier-imap/libexec/couriertcpd -address=0 -maxprocs=40 -maxperip=30 -nodnslookup -noidentlookup 995 /usr/lib/courier-imap/bin/couriertls -server -tcpd /usr/lib/courier-imap/sbin/pop3login /usr/lib/courier-imap/bin/pop3d Maildir
15950 ? S 0:00 0 44 1515 492 0.0 /usr/lib/courier-imap/libexec/couriertcpd -address=0 -maxprocs=40 -maxperip=30 -nodnslookup -noidentlookup 995 /usr/lib/courier-imap/bin/couriertls -server -tcpd /usr/lib/courier-imap/sbin/pop3login /usr/lib/courier-imap/bin/pop3d Maildir
15971 ? Ss 0:00 0 678 6669 1880 0.0 /usr/sbin/exim -bd -q60m
15977 ? Ss 0:00 0 678 6669 1800 0.0 /usr/sbin/exim -tls-on-connect -bd -oX 465
15982 ? S 0:00 0 829 2214 1584 0.0 antirelayd
16024 ? Ss 0:00 1 829 24742 19592 0.5 /usr/bin/spamd -d --allowed-ips=127.0.0.1 --pidfile=/var/run/spamd.pid --max-children=5
16046 ? Ss 0:07 2 533 13126 5752 0.1 /usr/local/apache/bin/httpd -DSSL
16057 ? Ss 0:00 0 36 2435 1040 0.0 crond
16073 ? S 0:03 4 829 28146 25804 0.7 spamd child
16074 ? S 0:00 14 829 25006 22188 0.6 spamd child
16075 ? S 0:54 120 533 16206 9392 0.2 /usr/local/apache/bin/httpd -DSSL
16076 ? S 0:57 154 533 16306 9500 0.2 /usr/local/apache/bin/httpd -DSSL
16077 ? S 0:54 159 533 16426 9628 0.2 /usr/local/apache/bin/httpd -DSSL
16078 ? S 1:00 143 533 16046 9224 0.2 /usr/local/apache/bin/httpd -DSSL
16079 ? S 0:54 191 533 16330 9508 0.2 /usr/local/apache/bin/httpd -DSSL
16131 ? S 0:00 0 829 6754 4892 0.1 eximstats
16160 ? S 0:55 89 533 16222 9424 0.2 /usr/local/apache/bin/httpd -DSSL
16167 ? S 0:00 1 829 6090 4940 0.1 cpbandwd
16168 ? SN 0:03 19 829 15762 13068 0.3 cpanellogd - sleeping for logs
16185 ? S 0:00 0 829 2950 2300 0.0 entropychat
16189 ? S 0:54 167 533 16114 9288 0.2 /usr/local/apache/bin/httpd -DSSL
16190 ? S 0:51 125 533 15974 9176 0.2 /usr/local/apache/bin/httpd -DSSL
16191 ? S 0:00 1 52 1623 552 0.0 /usr/local/cpanel/bin/startmelange
16208 ? Ss 0:00 1 61 9774 4560 0.1 /usr/bin/stunnel-4.15local /usr/local/cpanel/etc/stunnel/default/stunnel.conf.run
16213 ? S 0:53 110 533 16214 9404 0.2 /usr/local/apache/bin/httpd -DSSL
16214 ? S 0:51 133 533 16170 9356 0.2 /usr/local/apache/bin/httpd -DSSL
16217 ? Ss 0:00 0 828 8367 5604 0.1 /usr/local/bin/python2.4 /usr/local/cpanel/3rdparty/mailman/bin/mailmanctl -s start
16224 ? Ss 0:00 0 61 3982 1084 0.0 /usr/sbin/saslauthd -m /var/run/saslauthd -a pam -n 1
16247 ? Ss 0:00 0 27 1452 492 0.0 /usr/sbin/portsentry -tcp
16255 ? S 0:00 0 828 8091 5344 0.1 /usr/local/bin/python2.4 /usr/local/cpanel/3rdparty/mailman/bin/qrunner --runner=ArchRunner:0:1 -s
16256 ? S 0:00 0 828 8115 5520 0.1 /usr/local/bin/python2.4 /usr/local/cpanel/3rdparty/mailman/bin/qrunner --runner=BounceRunner:0:1 -s
16257 ? S 0:00 0 828 8111 5164 0.1 /usr/local/bin/python2.4 /usr/local/cpanel/3rdparty/mailman/bin/qrunner --runner=CommandRunner:0:1 -s
16258 ? S 0:00 0 828 8075 5760 0.1 /usr/local/bin/python2.4 /usr/local/cpanel/3rdparty/mailman/bin/qrunner --runner=IncomingRunner:0:1 -s
16259 ? S 0:00 0 828 8087 5356 0.1 /usr/local/bin/python2.4 /usr/local/cpanel/3rdparty/mailman/bin/qrunner --runner=NewsRunner:0:1 -s
16260 ? S 0:00 0 828 8111 4780 0.1 /usr/local/bin/python2.4 /usr/local/cpanel/3rdparty/mailman/bin/qrunner --runner=OutgoingRunner:0:1 -s
16261 ? S 0:00 0 828 8119 5072 0.1 /usr/local/bin/python2.4 /usr/local/cpanel/3rdparty/mailman/bin/qrunner --runner=VirginRunner:0:1 -s
16262 ? S 0:00 0 828 8119 4672 0.1 /usr/local/bin/python2.4 /usr/local/cpanel/3rdparty/mailman/bin/qrunner --runner=RetryRunner:0:1 -s
22479 ? S 0:00 0 2127 6332 6232 0.1 /etc/authlib/authProg
28484 ? S 0:00 0 2127 6332 6996 0.2 /etc/authlib/authProg
28488 ? S 0:00 0 2127 6332 6996 0.2 /etc/authlib/authProg
5372 ? S 0:00 0 2127 6332 6996 0.2 /etc/authlib/authProg
25825 ? S 0:02 0 3552 8707 10792 0.3 cpsrvd - waiting for connections
7655 ? S 0:00 0 2127 6332 6996 0.2 /etc/authlib/authProg
19601 ? S 0:07 5 533 15518 8700 0.2 /usr/local/apache/bin/httpd -DSSL
30024 ? Ss 0:00 3 106 5765 1812 0.0 pure-ftpd (SERVER)
30027 ? S 0:00 0 8 3559 928 0.0 /usr/sbin/pure-authd -s /var/run/ftpd.sock -r /usr/sbin/pureauth
3949 ? S 0:01 0 3552 9059 11152 0.3 whostmgrd - serving 127.0.0.1
3950 ? S 0:00 0 7839 15344 21744 0.6 /usr/local/cpanel/whostmgr/bin/whostmgr2 ./managepid
3951 ? Z 0:00 0 0 0 0 0.0 [ps] <defunct>
3952 ? S 0:01 2 166 1477 532 0.0 strace -p 16260
9881 ? S 0:00 1 533 15450 8612 0.2 /usr/local/apache/bin/httpd -DSSL
11712 ? S 0:00 1 533 15454 8620 0.2 /usr/local/apache/bin/httpd -DSSL
11749 ? S 0:00 2 533 15490 8656 0.2 /usr/local/apache/bin/httpd -DSSL
14310 ? Ss 0:00 0 296 6603 2184 0.0 sshd: surfingw [priv]
15455 ? S 0:00 0 296 6603 2248 0.0 sshd: surfingw@ttyp0
15457 ttyp0 Ss 0:00 0 573 1578 1276 0.0 -bash
20096 ? S 0:00 0 533 13258 5904 0.1 /usr/local/apache/bin/httpd -DSSL
20103 ? S 0:00 0 533 13258 5904 0.1 /usr/local/apache/bin/httpd -DSSL
20104 ? S 0:00 0 533 13270 5924 0.1 /usr/local/apache/bin/httpd -DSSL
20136 ttyp0 R+ 0:00 0 56 2207 680 0.0 ps axv
we have a dedicatd linux server. we use to send daily newsletters to our customers but for last few days, it looks like our mail server is sending out email to client's spam folder.
Is there any way to diagnose our mail server and find out if there is anything wrong or if our mail server has been black listed?
if anybody knows of a script that I could install on my server
and use to do a query in RBL databases, just like this page
[url]
Just wanted to know if anyone know of a black owned dedicated web hosting company?
View 11 Replies View Related[url]
i like the I/O panel is in the front and not the back. It can be a pain in the butt to access the back I/O panel in the DC.
I'm pretty sure the default SuperMicro panel will have to be take out but is there any motherboard that can fit this case? Did anyone try this case? Can it be bolt down by its ears? It's interesting that i don't see the blower on this case. How do you cool it?
I just got email from the company with which I co locate my servers (one of the resellers in MPT). The email said:
"We have detected a deny of service attack on one of your IP's
69.90.xxx.xxx. The attack was approximately 200Kpps and 120Mbps. The
IP has been null routed and will be in place for 24 hours."
Now all my sites hosted on that IP are down.
Is this the way the co location companies and their upstream providers deal with DOS attacks?
Its going to harm me a lot if I have to wait for 24 hours for the
services to work.
can any1 tell me if this is ok for 3 or 4 days i was having Black and yellow zone alerts for NUMFILE on my vps, vps has 256Ram,1024 burst, using centos, virtuozzo and cpanel
somehone can tell me what else to check,
Code:
root@ns1 [~]# cat /proc/user_beancounters
Version: 2.5
uid resource held maxheld barrier limit failcnt
399: kmemsize 8507424 8831248 59228160 60948480 0
lockedpages 0 0 1536 1536 0
privvmpages 90223 93110 262144 270008 0
shmpages 3279 3279 129024 129024 0
dummy 0 0 0 0 0
numproc 86 89 500 500 3736
physpages 47988 50219 0 2147483647 0
vmguarpages 0 0 65536 2147483647 0
oomguarpages 49398 51629 65536 2147483647 0
numtcpsock 47 51 1880 1880 0
numflock 12 13 1128 1236 0
numpty 1 1 64 64 0
numsiginfo 0 1 1536 1536 0
tcpsndbuf 436020 467324 10321920 16220160 0
tcprcvbuf 770048 802816 10321920 16220160 0
othersockbuf 34888 39360 6756480 12582912 0
dgramrcvbuf 0 0 1572864 1572864 0
numothersock 30 34 2160 2160 0
dcachesize 1012491 1047191 13639680 14499840 0
numfile 4370 4487 8192 8192 6491
dummy 0 0 0 0 0
dummy 0 0 0 0 0
dummy 0 0 0 0 0
numiptent 298 298 2000 2000 0
root@ns1 [~]#
Code:
root@ns1 [~]# ps -auxf
Warning: bad syntax, perhaps a bogus '-'? See /usr/share/doc/procps-3.2.3/FAQ
USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND
root 1 0.0 0.0 1620 600 ? Ss 2006 0:22 init [3]
root 26544 0.0 0.0 1524 544 ? Ss 2006 0:18 syslogd -m 0
named 26570 0.0 0.0 46640 2976 ? Ssl 2006 1:14 /usr/sbin/named -u named
root 27659 0.0 0.0 1448 376 ? S 2006 0:00 /usr/sbin/courierlogger -pid=/var/spool/authdaemon
root 27667 0.0 0.0 1796 616 ? S 2006 0:00 \_ /usr/libexec/courier-authlib/authdaemond
root 27697 0.0 0.0 1796 368 ? S 2006 0:00 \_ /usr/libexec/courier-authlib/authdaemond
root 7289 0.0 0.1 9880 8584 ? S Jan21 0:06 | \_ /etc/authlib/authProg
root 27699 0.0 0.0 1796 368 ? S 2006 0:00 \_ /usr/libexec/courier-authlib/authdaemond
root 13800 0.0 0.0 9888 6156 ? S 2006 0:22 | \_ /etc/authlib/authProg
root 27700 0.0 0.0 1796 368 ? S 2006 0:00 \_ /usr/libexec/courier-authlib/authdaemond
root 5506 0.0 0.1 9880 8584 ? S Jan21 0:06 | \_ /etc/authlib/authProg
root 27701 0.0 0.0 1796 368 ? S 2006 0:00 \_ /usr/libexec/courier-authlib/authdaemond
root 7516 0.0 0.1 9880 8588 ? S Jan21 0:07 | \_ /etc/authlib/authProg
root 27702 0.0 0.0 1796 368 ? S 2006 0:00 \_ /usr/libexec/courier-authlib/authdaemond
root 31958 0.0 0.1 9880 8584 ? S Jan21 0:07 \_ /etc/authlib/authProg
root 30718 0.0 0.0 4008 1128 ? Ss 2006 0:02 /usr/sbin/sshd
root 29967 0.0 0.0 6900 2280 ? Ss 15:06 0:00 \_ sshd: root@pts/0
root 30115 0.0 0.0 2944 1280 ? Ss 15:06 0:00 \_ login -- root
root 30124 0.0 0.0 2280 1340 pts/0 Ss 15:06 0:00 \_ -bash
root 5923 0.0 0.0 2300 812 pts/0 R+ 15:20 0:00 \_ ps -auxf
root 31769 0.0 0.0 2072 788 ? Ss 2006 0:00 xinetd -stayalive -pidfile /var/run/xinetd.pid
root 31780 0.0 0.0 2144 1124 ? S 2006 0:00 /bin/sh /usr/bin/mysqld_safe --datadir=/var/lib/my
mysql 31808 0.0 0.3 112316 24712 ? Sl 2006 9:08 \_ /usr/sbin/mysqld --basedir=/ --datadir=/var/li
root 31980 0.0 0.0 9752 8012 ? S 2006 1:05 chkservd
root 31995 0.0 0.0 1452 380 ? S 2006 0:01 /usr/sbin/courierlogger -pid=/var/run/imapd.pid -s
root 31996 0.0 0.0 1560 512 ? S 2006 0:02 \_ /usr/lib/courier-imap/libexec/couriertcpd -add
root 32018 0.0 0.0 1452 300 ? S 2006 0:00 /usr/sbin/courierlogger -pid=/var/run/imapd-ssl.pi
root 32019 0.0 0.0 1560 492 ? S 2006 0:00 \_ /usr/lib/courier-imap/libexec/couriertcpd -add
root 32027 0.0 0.0 1452 380 ? S 2006 0:02 /usr/sbin/courierlogger -pid=/var/run/pop3d.pid -s
root 32029 0.0 0.0 1560 512 ? S 2006 0:02 \_ /usr/lib/courier-imap/libexec/couriertcpd -add
root 32036 0.0 0.0 1452 300 ? S 2006 0:00 /usr/sbin/courierlogger -pid=/var/run/pop3d-ssl.pi
root 32037 0.0 0.0 1560 492 ? S 2006 0:00 \_ /usr/lib/courier-imap/libexec/couriertcpd -add
root 32263 0.0 0.0 2472 928 ? Ss 2006 0:05 crond
root 32288 0.0 0.0 3024 1160 ? S 15:20 0:00 \_ crond
root 32370 0.0 0.0 2096 1036 ? Ss 15:20 0:00 \_ /bin/sh /usr/local/sbin/bfd -q
root 32463 0.1 0.0 2100 1068 ? S 15:20 0:00 \_ /bin/sh /usr/local/sbin/bfd -s
root 5917 0.0 0.0 2100 468 ? R 15:20 0:00 \_ /bin/sh /usr/local/sbin/bfd -s
root 5918 0.0 0.0 2096 976 ? S 15:20 0:00 \_ /bin/sh /usr/local/bfd/tlog /v
root 5922 0.0 0.0 2096 564 ? R 15:20 0:00 | \_ /bin/sh /usr/local/bfd/tlo
root 5919 0.0 0.0 1572 472 ? S 15:20 0:00 \_ grep sshd
root 5920 0.0 0.0 1572 484 ? S 15:20 0:00 \_ grep -viw error: Bind
root 5921 0.0 0.0 1516 468 ? S 15:20 0:00 \_ sed s/::ffff://
root 5924 0.0 0.0 1572 420 ? R 15:20 0:00 \_ grep -vi invalid
root 1434 0.0 0.0 4044 804 ? Ss 2006 0:00 /usr/sbin/saslauthd -m /var/run/saslauthd -a shado
root 1444 0.0 0.0 4044 464 ? S 2006 0:00 \_ /usr/sbin/saslauthd -m /var/run/saslauthd -a s
root 1508 0.0 0.0 1480 392 ? Ss 2006 0:00 /usr/sbin/portsentry -tcp
root 32126 0.0 0.0 3828 1324 ? Ss 2006 0:00 pure-ftpd (SERVER)
root 32130 0.0 0.0 3568 928 ? S 2006 0:00 /usr/sbin/pure-authd -s /var/run/ftpd.sock -r /usr
root 3137 0.0 0.0 7008 5256 ? S 2006 0:35 cpbandwd
root 3279 0.0 0.1 10812 8312 ? SN 2006 7:40 cpanellogd - sleeping for logs
mailnull 3299 0.0 0.0 7712 5264 ? S 2006 0:34 eximstats
mailnull 32022 0.0 0.0 7348 1984 ? Ss Jan02 0:00 /usr/sbin/exim -bd -oX 26
mailnull 32030 0.0 0.0 7348 1996 ? Ss Jan02 0:20 /usr/sbin/exim -bd -q180m
mailnull 32046 0.0 0.0 7348 1964 ? Ss Jan02 0:00 /usr/sbin/exim -tls-on-connect -bd -oX 465
root 32128 0.0 0.0 3044 1176 ? S Jan02 0:47 antirelayd
root 17635 0.0 0.2 25752 23600 ? Ss Jan02 0:32 /usr/bin/spamd -d --allowed-ips=127.0.0.1 --pidfil
root 22098 0.0 0.3 29440 27060 ? S 04:20 0:02 \_ spamd child
root 9762 0.1 0.3 30216 28136 ? S 11:16 0:19 \_ spamd child
postgres 1351 0.0 0.0 16732 2148 ? S Jan21 0:00 /usr/bin/postmaster -p 5432 -D /var/lib/pgsql/data
postgres 1354 0.0 0.0 7532 880 ? S Jan21 0:00 \_ postgres: stats buffer process
postgres 1355 0.0 0.0 6540 1024 ? S Jan21 0:00 | \_ postgres: stats collector process
postgres 29997 0.0 0.1 17544 11528 ? S 09:56 0:02 \_ postgres: wifidog wifidog 127.0.0.1 idle
postgres 30561 0.0 0.1 18104 11852 ? S 09:56 0:02 \_ postgres: wifidog wifidog 127.0.0.1 idle
postgres 31864 0.0 0.1 17592 11532 ? S 09:57 0:02 \_ postgres: wifidog wifidog 127.0.0.1 idle
postgres 32183 0.0 0.1 17496 11288 ? S 09:57 0:01 \_ postgres: wifidog wifidog 127.0.0.1 idle
postgres 32285 0.0 0.1 17580 11536 ? S 09:57 0:01 \_ postgres: wifidog wifidog 127.0.0.1 idle
postgres 32299 0.0 0.1 18016 11708 ? S 09:57 0:03 \_ postgres: wifidog wifidog 127.0.0.1 idle
postgres 3076 0.0 0.1 18080 11732 ? S 09:58 0:02 \_ postgres: wifidog wifidog 127.0.0.1 idle
postgres 5427 0.0 0.1 17488 11280 ? S 09:59 0:02 \_ postgres: wifidog wifidog 127.0.0.1 idle
postgres 26225 0.0 0.1 17544 11280 ? S 10:12 0:01 \_ postgres: wifidog wifidog 127.0.0.1 idle
postgres 27895 0.0 0.1 17544 11292 ? S 10:20 0:01 \_ postgres: wifidog wifidog 127.0.0.1 idle
root 28058 0.0 0.1 17508 9088 ? S Jan30 0:02 cpsrvd - waiting for connections
root 29793 0.0 0.1 19096 9928 ? Ss 09:56 0:00 /usr/local/apache/bin/httpd -DSSL
nobody 29829 0.0 0.1 19408 9556 ? S 09:56 0:03 \_ /usr/local/apache/bin/httpd -DSSL
nobody 29830 0.0 0.1 19444 9560 ? S 09:56 0:02 \_ /usr/local/apache/bin/httpd -DSSL
nobody 29831 0.0 0.1 19448 9820 ? S 09:56 0:04 \_ /usr/local/apache/bin/httpd -DSSL
nobody 29832 0.0 0.1 20576 9708 ? S 09:56 0:04 \_ /usr/local/apache/bin/httpd -DSSL
nobody 29833 0.0 0.1 20572 9936 ? S 09:56 0:05 \_ /usr/local/apache/bin/httpd -DSSL
nobody 30225 0.0 0.1 19332 9472 ? S 09:56 0:03 \_ /usr/local/apache/bin/httpd -DSSL
nobody 31771 0.0 0.1 19452 9532 ? S 09:57 0:03 \_ /usr/local/apache/bin/httpd -DSSL
nobody 31872 0.0 0.1 20584 9724 ? S 09:57 0:03 \_ /usr/local/apache/bin/httpd -DSSL
nobody 22289 0.0 0.1 19456 9588 ? S 10:10 0:03 \_ /usr/local/apache/bin/httpd -DSSL
nobody 22324 0.0 0.1 19328 9464 ? S 10:10 0:03 \_ /usr/local/apache/bin/httpd -DSSL
root@ns1 [~]#
I know this can be the most foolishly question on WHT but I'm looking for mod_evasive's download link, I tried googling and searching all forums but all links was dead
anybody can give me a link to get mod_evasive ? Ofcourse If you have a better idea than using of mod_evasive I'll be glad to hear
We installed mod_evasive and ever since we are getting files like: dos-xxx.xxx.xxx.xxx, where xxx.xxx.xxx.xxx is an IP in our /tmp directory. The contents of the file is usually a 4 or 5 digit number and is owned by apache. Can anyone help me understand what this file is? Is it a product of mod_evasive? Can the files be deleted?
View 14 Replies View RelatedI have a file named dos-1.2.13.4 (i changed the IP address in purpose) inside the log and inside the file there is a 4 digit number that is constantly changing. more
[root@myserver]# more dos-1.2.13.4
8726
What is 8726?
We are having problem with installing mod_evasive on our server. We tried installing it on our Virtual Machine that runs Fedora 7 (on our server, we have Fedora core 5), and on Virtual Machine it is fine, we can compile it and put it in our Apache2 conf file.
However, when we try
[root@ mod_evasive]# /usr/local/psa/admin/bin/apxs -i -a -c mod_evasive20.c
on the server, we get a
[root@ mod_evasive]# /usr/local/psa/admin/bin/apxs -i -a -c mod_evasive20.c
gcc -DHARD_SERVER_LIMIT=512 -DDEFAULT_PATH="/usr/local/psa/admin/bin:/bin:/usr/bin" -DLINUX=22 -DTARGET="httpsd" -DHAVE_SET_DUMPABLE -DNO_DBM_REWRITEMAP -DMOD_SSL=208122 -DEAPI -O -pipe -I/usr/include -O3 -fexpensive-optimizations -fstrength-reduce -pipe -DPLESK_Linux -I/home/builder/buildbot/psa-8.2.1-bfc7/build/plesk/lib/dist/include/libxml2 -W -Wall -DPLESK_Linux -I/home/builder/buildbot/psa-8.2.1-bfc7/build/plesk/plesk-utils/include -DBSG_CR -DBSG_MSG -D_LARGEFILE_SOURCE -D_FILE_OFFSET_BITS=64 -DHAS_RPM -DUSE_SLEEP_ON_IDLE -Wno-unused-parameter -fpic -DSHARED_MODULE -I/usr/local/psa/admin/include -c mod_evasive20.c ....
I have 2 questions here.
1. I have installed mod_evasive version 1.10.1 on a Cent OS 4.4 server.
I'm using the test.pl script that comes with mod_evasive to test the configuration and when running the script from the same server mod_Evasive is installed. The mod_evasive is able to detect the intrusion and block the IP of the server.
If I use the same test.pl script from an external server the requests come in and are viewable in the access log but mod_evasive doesnt block the IP of the external server. Probably is not blocing the ip of the external server because of latency.
Is there a way to modify the test.pl script to make it more agressive and get results when testing from an external server?
Here I'm pasting the code of the test.pl script:
Code:
#!/usr/bin/perl
# test.pl: small script to test mod_dosevasive's effectiveness
use IO::Socket;
use strict;
for(0..100) {
my($response);
my($SOCKET) = new IO::Socket::INET( Proto => "tcp",
PeerAddr=> "test.domain.tld:80");
if (! defined $SOCKET) { die $!; }
print $SOCKET "GET /?$_ HTTP/1.0
";
$response = <$SOCKET>;
print $response;
close($SOCKET);
}
2. Also, I have sendmail installed and on the mod_evasive config I have email address specified on DOSEmailNotify. When testing from the internal server with the test.pl script the server is able to block the ip, put in the hash table but it never sends an email to my email address.
mod_evasive settings?
I cant find out the setting which would ban all bad IPs and will nto ban normal ones.
Does anyone know any good mod_evasive rules that pick up DoS, but not many false positives? Just looking to see what works for everyone out there, been having trouble.
Or if there is better apache module to combat DoS.
i want to install mod on my centos Cpanel server. so i try:
cd /usr/local/src
wget mod_evasive_1.10.1.tar.gz
tar -zxf mod_evasive_1.10.1.tar.gz
cd mod_evasive
/usr/sbin/apxs -cia mod_evasive20.c
but when i run /usr/sbin/apxs -cia mod_evasive20.c there is some error for me :
[root@ mod_evasive]#/usr/sbin/apxs -cia mod_evasive20.c
-bash: /usr/sbin/apxs: No such file or directory
and is it good to install or not?[url]
View 5 Replies View RelatedI have 2 questions here.
1. I have installed mod_evasive version 1.10.1 on a Cent OS 4.4 server.
I'm using the test.pl script that comes with mod_evasive to test the configuration and when running the script from the same server mod_Evasive is installed. The mod_evasive is able to detect the intrusion and block the IP of the server.
If I use the same test.pl script from an external server the requests come in and are viewable in the access log but mod_evasive doesnt block the IP of the external server.
Probably is not blocing the ip of the external server because of latency.
Is there a way to modify the test.pl script to make it more agressive and get results when testing from an external server?
Here I'm pasting the code of the test.pl script:
Quote:
#!/usr/bin/perl
# test.pl: small script to test mod_dosevasive's effectiveness
use IO:ocket;
use strict;
for(0..100) {
my($response);
my($SOCKET) = new IO:ocket::INET( Proto => "tcp",
PeerAddr=> "test.domain.tld:80");
if (! defined $SOCKET) { die $!; }
print $SOCKET "GET /?$_ HTTP/1.0
";
$response = <$SOCKET>;
print $response;
close($SOCKET);
}
2. Also, I have sendmail installed and on the mod_evasive config I have email address specified on DOSEmailNotify. When testing from the internal server with the test.pl script the server is able to block the ip, put in the hash table but it never sends an email to my email address.
I got mod_evasive installed and its working fine. Its detecting the IPs, blocking the IPs and sending me the emails.
The emails I'm getting only have the sender name "Apache" and the content shows the IP address is blocking.
How can I enhance the email report to display the following:
1) get a proper Subject header in the email
2) change the From header to include the hostname - i.e.
apache@web.domain.tld
3) have the program do a reverse lookup on the ip, and include that in the body.
Do I need to include a script using the DOSSystemCommand to do this?
I have 2 questions here.
1. I have installed mod_evasive version 1.10.1 on a Cent OS 4.4 server.
I'm using the test.pl script that comes with mod_evasive to test the configuration and when running the script from the same server mod_Evasive is installed. The mod_evasive is able to detect the intrusion and block the IP of the server.
If I use the same test.pl script from an external server the requests come in and are viewable in the access log but mod_evasive doesnt block the IP of the external server. Probably is not blocing the ip of the external server because of latency.
Is there a way to modify the test.pl script to make it more agressive and get results when testing from an external server?
Here I'm pasting the code of the test.pl script:
Quote:
#!/usr/bin/perl
# test.pl: small script to test mod_dosevasive's effectiveness
use IO:Socket;
use strict;
for(0..100) {
my($response);
my($SOCKET) = new IO:Socket::INET( Proto => "tcp",
PeerAddr=> "test.domain.tld:80");
if (! defined $SOCKET) { die $!; }
print $SOCKET "GET /?$_ HTTP/1.0
";
$response = <$SOCKET>;
print $response;
close($SOCKET);
}
2. Also, I have sendmail installed and on the mod_evasive config I have email address specified on DOSEmailNotify. When testing from the internal server with the test.pl script the server is able to block the ip, put in the hash table but it never sends an email to my email address.
Is there a way to block ips with mod_evasive by adding the ips to the mod_evasive configuration file?
View 3 Replies View RelatedInstalling mod_evasive after serveral attacks on our server.
but when restarting httpd I get this error,
httpd: Syntax error on line 36 of /usr/local/apache/conf/httpd.conf: API module structure 'evasive20_module' in file /usr/lib/httpd/modules/mod_evasive20.so is garbled - expected signature 41503232 but saw 41503230 - perhaps this is not an Apache module DSO, or was compiled for a different Apache version?
Running apache 2.2.8
I would like to install the Mod_evasive for Apache 2.0 on RHEL 4 Server(Cpanel Installed). I downloaded the Mod_evasive source and extracted and used the following command.
# cd mod_evasive
# /usr/sbin/apxs -cia mod_evasive20.c
I am getting folowing message.
-bash: /usr/sbin/apxs: No such file or directory
# whereis apxs
apxs:
We tried to use one software for offline browsing to download our site and test it if it will fail or not. We used 500 threads at once. Program was able to request 56 pages per second. Of course server (site) failed because there were no more available mysql connections. So site went down. Mod_evasive didn't block that.
Here is the config:
<IfModule mod_evasive20.c>
DOSHashTableSize 3097
DOSPageCount 2
DOSSiteCount 80
DOSPageInterval 1
DOSSiteInterval 1
DOSBlockingPeriod 30
DOSLogDir "/var/log/httpd"
</IfModule>
Here is the copy of text I found on one site about mod_evasive:
Mod_evasive does work relatively well for small to medium sized brute force or HTTP level DoS attacks. There is, however, an important limitation that mod_evasive has that you should be aware of. The mod_evasive module is not as good as it could be because it does not use shared memory in Apache to keep information about previous requests persistent. Instead, the information is kept with each child process or thread. Other Apache children that are then spawned know nothing about abuse against one of them. When a child serves the maximum number of requests and dies, the DoS information goes with it. So, what does this mean? This means that if an attacker sends their HTTP DoS requests and they do not use HTTP Keep-Alives, then Apache will spawn a new child process for every request and it will never trigger the mod_evasive thresholds. This is not good…
Is there any solution for such type of attack with Keep Alive disabled?
mod_evasive bans some of the legit users (galleries , typo3 etc.) with following settings:
<IfModule mod_dosevasive20.c>
DOSHashTableSize 3097
DOSPageCount 10
DOSSiteCount 150
DOSPageInterval 1
DOSSiteInterval 3
DOSBlockingPeriod 10
</IfModule>
Somebody have an idea for some less restrictive but still usefull rules?
The server gets around 25k unique visitors per day, but one website in particular allows hotlinking and uses a lot of bandwidth. Last time I checked...according to whm apache status page, I was getting 180 requests per second. Not sure what time it was though. So it might be higher at a different time of the day.
Recently got mod_evasive installed, but I didn't want it to block out legitimate users. Currently it's set to this...
<IfModule mod_evasive20.c>
DOSHashTableSize 3097
DOSPageCount 5
DOSSiteCount 100
DOSPageInterval 2
DOSSiteInterval 2
DOSBlockingPeriod 10
DOSBlockingPeriod 600
</IfModule>
what a better configuration would be? When I run the log I already see it block out a bunch of IP's. I don't want to lose any visitors to this program, but I do get ddos a lot.