开发者

How to protect spammers to apache? [closed]

开发者 https://www.devze.com 2023-01-26 16:17 出处:网络
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers.

This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question may be able to be answered.

Closed 3 years ago.

Improve this question

I have the following for www.domain.com and login.domain.com. But spammers forward there site to login.domain.com and it works. How can I block them?

Ex: http://spammerexmaple.sex.com opens http://login.domain.com (I want to block this)

<VirtualHost *:80>
 ServerName login.domain.com
 ServerAlias login.domain.com
 DocumentRoot /var/www/html/com/public
 <Directory /var/www/html/com/public>
        #AddDefaultCharset utf-8
        DirectoryIndex index.php
        AllowOverride All
        Order allow,deny
        Allow from all
 </Directory>

</VirtualHost>


<VirtualHost *:80>
 ServerName www.domain.com
 ServerAlias domain.com
 DocumentRoot /var/www/html/www/public
 <Directory /var/www/html/www/public>
    # Compress output
    AddOutputFilterByType DEFLATE text/html text/css text/plain text/xml application/x-javascript
    BrowserMatch ^Mozilla/4 gzip-only-text/html
    BrowserMatch ^Mozilla/4.0[678] no-gzip
    BrowserMatch bMSIE !no-gzip !gzip-only-text/html

        #AddDefaultCharset utf-8
        DirectoryIndex index.php
        AllowOverride All
        Order allow,deny
        Allow from all
 </Directory>

</VirtualHost>

Follow up:

Spammers forward www.spammer.com to login.domain.com or www.spammer.sex.com anything someone can forward to login.domain.com and it works.

How can I block this?

[root@d dd.dd.com]# httpd -S
VirtualHost configuration:
wildcard NameVirtualHosts and _default_ servers:
_default_:443          d (/etc/httpd/conf.d/ssl.conf:81)
*:80                   is a NameVirtualHost
         default server dummy.com (/etc/httpd/conf/httpd.conf:1028)
         port 80 namevhost dummy.com (/etc/httpd/conf/httpd.conf:1028)
         port 80 namevhost dd.dd.com (/etc/httpd/conf/httpd.conf:1039)
         port 80 namevhost aa.aa.com (/etc/httpd/conf/httpd.conf:1058)
Syntax OK





<VirtualHost *:80>
 ServerName开发者_StackOverflow中文版 dummy.com
 DocumentRoot /tmp
 <Directory /tmp>
        deny from all
 </Directory>

</VirtualHost>

<VirtualHost *:80>
 ServerName dd.dd.com
 #ServerAlias dd.dd.com
 DocumentRoot /var/www/html/dd.dd.com/public
 <Directory /var/www/html/dd.dd.com/public>
        #AddDefaultCharset utf-8
        DirectoryIndex index.php
        AllowOverride All
        Order allow,deny
        Allow from all
 </Directory>

</VirtualHost>


<VirtualHost *:80>
 ServerName aa.aa.com
 ServerAlias aa.com
 DocumentRoot /var/www/html/aa.aa.com/public
 <Directory /var/www/html/aa.aa.com/public>
    # Compress output
    AddOutputFilterByType DEFLATE text/html text/css text/plain text/xml application/x-javascript
    BrowserMatch ^Mozilla/4 gzip-only-text/html
    BrowserMatch ^Mozilla/4.0[678] no-gzip
    BrowserMatch bMSIE !no-gzip !gzip-only-text/html

        #AddDefaultCharset utf-8
        DirectoryIndex index.php
        AllowOverride All
        Order allow,deny
        Allow from all
 </Directory>


Action 1: Iptables are best + Physical routers such as Cisco Pix or other routers and making black lists + checking the incoming source ip with black listed ip networks, and suspend there access to our network.

Action 2: Putting some moderators, who screen the incoming traffic and bounce them as soon as possible and mark them spammer, and also report those to other networks

Action 3: god bless us, and hope we get more informations.. its a unlimited game, never ends.

Hope it help others at-least to know possibilities.

0

精彩评论

暂无评论...
验证码 换一张
取 消

关注公众号