<div dir="ltr">On Mon, Aug 7, 2017 at 5:57 AM, Karanbir Singh <span dir="ltr"><<a href="mailto:mail-lists@karan.org" target="_blank">mail-lists@karan.org</a>></span> wrote:<br><div class="gmail_extra"><div class="gmail_quote"><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-style:solid;border-left-color:rgb(204,204,204);padding-left:1ex"><span class="gmail-"><br>
> I had recommended and Fabian looked at mod-evasive, but has reservations<br>
> around that. how do people these days typically handle flood situations ?<br>
><br></span></blockquote><div><br></div><div>What are the concerns with mod_evasive? I'm not sure if it makes sense to add Varnish to the mix, but I've been testing the Varnish vsthrottle module for DoS mitigation, and it seems to work well. The nice part with doing this in Varnish is it is very customizable within the VCL -- here's an old post with a small code snippet, but this could be customized to whitelist based on any header, source IP, etc. which seems to be a lot more flexible than mod_evasive -- and you may get some caching benefits from Varnish as well, though not for the larger downloads. <a href="https://old.varnish-cache.org/vmod/vsthrottle-rate-limitingthrottling-v4-and-later">https://old.varnish-cache.org/vmod/vsthrottle-rate-limitingthrottling-v4-and-later</a></div><div><br></div><div>-Jeff<br></div></div><br></div></div>