<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0">
<channel>
<title><![CDATA[向东博客 专注WEB应用 构架之美 --- 构架之美，在于尽态极妍 | 应用之美，在于药到病除]]></title> 
<link>http://www.jackxiang.com/index.php</link> 
<description><![CDATA[赢在IT，Playin' with IT,Focus on Killer Application,Marketing Meets Technology.]]></description> 
<language>zh-cn</language> 
<copyright><![CDATA[向东博客 专注WEB应用 构架之美 --- 构架之美，在于尽态极妍 | 应用之美，在于药到病除]]></copyright>
<item>
<link>http://www.jackxiang.com/post//</link>
<title><![CDATA[OpenResty(nginx扩展)实现防cc攻击，Centos简单处理CC攻击shell脚本。]]></title> 
<author>jack &lt;xdy108@126.com&gt;</author>
<category><![CDATA[WEB2.0]]></category>
<pubDate>Wed, 29 May 2013 06:27:54 +0000</pubDate> 
<guid>http://www.jackxiang.com/post//</guid> 
<description>
<![CDATA[ 
	http://www.centos.bz/2012/12/openresty-nginx-block-cc-attack-deploy/<br/>Linux系统防CC攻击自动拉黑IP增强版Shell脚本：http://zhangge.net/4649.html<br/><br/><br/>第一个脚本是通过查找日志中访问次数过多的ip,并用iptables屏蔽。<br/>#!/bin/bash<br/>cur=`date +%H%M%S`<br/>becur=`date -d &quot;1 minute ago&quot; +%H%M%S`<br/>badip=`tail -n 10000 /home/www.centos.bz/log/access.log &#124; egrep -v &quot;&#92;.(gif&#124;jpg&#124;jpeg&#124;png&#124;css&#124;js)&quot; &#124; awk&nbsp;&nbsp;-v a=&quot;$becur&quot; -v b=&quot;$cur&quot; -F [&#039; &#039;:] &#039;&#123;t=$5$6$7;if (t&gt;=a &amp;&amp; t&lt;=b) print $1&#125;&#039; &#124; sort &#124; uniq -c &#124; awk &#039;&#123;if ($1&gt;=20) print $2&#125;&#039;`<br/>if [ ! -z &quot;$badip&quot; ];then<br/>for ip in $badip;<br/>do<br/>if test -z &quot;`/sbin/iptables -nL &#124; grep $ip`&quot;;then<br/>/sbin/iptables -I INPUT -s $ip -j DROP<br/>fi<br/>done<br/>fi<br/>将此代码保存为ban.sh，加入cronjob使每分钟执行一次。<br/>此脚本的作用是：利用iptables屏蔽每分钟访问页面超过20的IP，这些页面已经排除图片,css,js等静态文件。<br/>第二个脚本是通过在日志中查找cc攻击的特征进行屏蔽。<br/>#!/bin/bash<br/>keyword=&quot;cc-atack&quot;<br/>badip=`tail -n 5000&nbsp;&nbsp;/home/www.centos.bz/log/access.log &#124; grep &quot;$keyword&quot;&nbsp;&nbsp;&#124; awk &#039;&#123;print $1&#125;&#039; &#124; sort &#124; uniq -c &#124; sort -nr &#124; awk &#039;&#123;print $2&#125;&#039;`<br/>if [ ! -z &quot;$badip&quot; ];then<br/>for ip in $badip;<br/>do<br/>if test -z &quot;`/sbin/iptables -nL &#124; grep $ip`&quot;;then<br/>/sbin/iptables -I INPUT -s $ip -j DROP<br/>fi<br/>done<br/>fi<br/>keyword则是日志中cc的特征，替换成有效的即可。<br/><br/>来自：http://www.centoscn.com/CentosBug/2013/0310/170.html
]]>
</description>
</item><item>
<link>http://www.jackxiang.com/post//#blogcomment</link>
<title><![CDATA[[评论] OpenResty(nginx扩展)实现防cc攻击，Centos简单处理CC攻击shell脚本。]]></title> 
<author> &lt;user@domain.com&gt;</author>
<category><![CDATA[评论]]></category>
<pubDate>Thu, 01 Jan 1970 00:00:00 +0000</pubDate> 
<guid>http://www.jackxiang.com/post//#blogcomment</guid> 
<description>
<![CDATA[ 
	
]]>
</description>
</item>
</channel>
</rss>