瀏覽代碼

A compromise between DDoS defense and Owncloud's web interface

Bob Mottram 10 年之前
父節點
當前提交
6ccf68e0ab
共有 1 個文件被更改,包括 2 次插入1 次删除
  1. 2
    1
      install-freedombone.sh

+ 2
- 1
install-freedombone.sh 查看文件

@@ -3018,7 +3018,8 @@ function install_web_server {
3018 3018
   echo '        limit_conn_zone $binary_remote_addr zone=conn_limit_per_ip:10m;' >> /etc/nginx/nginx.conf
3019 3019
   echo '' >> /etc/nginx/nginx.conf
3020 3020
   echo '        # limit the number of requests for a given session' >> /etc/nginx/nginx.conf
3021
-  echo '        limit_req_zone $binary_remote_addr zone=req_limit_per_ip:10m rate=5r/s;' >> /etc/nginx/nginx.conf
3021
+  echo '        # Note that the Owncloud web interface seems to require a rate of around 140r/s' >> /etc/nginx/nginx.conf
3022
+  echo '        limit_req_zone $binary_remote_addr zone=req_limit_per_ip:10m rate=140r/s;' >> /etc/nginx/nginx.conf
3022 3023
   echo '' >> /etc/nginx/nginx.conf
3023 3024
   echo '        # if the request body size is more than the buffer size, then the entire (or partial) request body is written into a temporary file' >> /etc/nginx/nginx.conf
3024 3025
   echo '        client_body_buffer_size  128k;' >> /etc/nginx/nginx.conf