mirror of
https://github.com/owasp-modsecurity/ModSecurity.git
synced 2026-01-13 15:07:10 +03:00
Better alert from SecReadStateLimit
This commit is contained in:
2
CHANGES
2
CHANGES
@@ -1,6 +1,6 @@
|
||||
22 Nov 2010 - 2.5.13-dev3
|
||||
|
||||
* Add SecReadStateLimit to limit the number of BUSY connections
|
||||
* Add SecReadStateLimit to limit the number threads in BUSY connections per ip address
|
||||
|
||||
* Fixed redirect action was not expanding macros in chained rules
|
||||
|
||||
|
||||
@@ -1116,7 +1116,7 @@ static int hook_connection_early(conn_rec *conn)
|
||||
}
|
||||
|
||||
if (ip_count > conn_read_state_limit) {
|
||||
ap_log_error(APLOG_MARK, APLOG_WARNING, 0, NULL, "ModSecurity: Access denied with code 400. Too many connections [%d] of %ld allowed in READ state from %s - Possible DoS Consumption Attack [Rejected]", ip_count,conn_read_state_limit,conn->remote_ip);
|
||||
ap_log_error(APLOG_MARK, APLOG_WARNING, 0, NULL, "ModSecurity: Access denied with code 400. Too many threads [%d] of %ld allowed in READ state from %s - Possible DoS Consumption Attack [Rejected]", ip_count,conn_read_state_limit,conn->remote_ip);
|
||||
return OK;
|
||||
} else {
|
||||
return DECLINED;
|
||||
|
||||
Reference in New Issue
Block a user