summaryrefslogtreecommitdiff
path: root/www/mod_evasive20
diff options
context:
space:
mode:
Diffstat (limited to 'www/mod_evasive20')
-rw-r--r--www/mod_evasive20/Makefile46
-rw-r--r--www/mod_evasive20/distinfo3
-rw-r--r--www/mod_evasive20/pkg-descr30
3 files changed, 0 insertions, 79 deletions
diff --git a/www/mod_evasive20/Makefile b/www/mod_evasive20/Makefile
deleted file mode 100644
index 33fed2ee2af4..000000000000
--- a/www/mod_evasive20/Makefile
+++ /dev/null
@@ -1,46 +0,0 @@
-# New ports collection makefile for: mod_dosevasive20
-# Date created: 26 Jul 2004
-# Whom: Xavier Beaudouin <kiwi@oav.net>
-#
-# $FreeBSD$
-#
-
-PORTNAME= mod_dosevasive20
-PORTVERSION= 1.10
-PORTREVISION= 1
-CATEGORIES= www security
-MASTER_SITES= http://www.nuclearelephant.com/projects/dosevasive/ \
- ftp://ftp.oav.net/pkg_freebsd/distfiles/
-DISTNAME= mod_dosevasive_${PORTVERSION}
-DIST_SUBDIR= apache2
-
-MAINTAINER= kiwi@oav.net
-COMMENT= An Apache 2 module to try to protect HTTP DoS or DDoS attacks
-
-WRKSRC= ${WRKDIR}/${PORTNAME}
-
-USE_REINPLACE= yes
-WANT_APACHE= 2
-AP_FAST_BUILD= YES
-AP_GENPLIST= YES
-WRKSRC= ${WRKDIR}/mod_dosevasive
-
-PORTDOCS= LICENSE README test.pl
-
-.include <bsd.port.pre.mk>
-.include "${PORTSDIR}/www/apache20/Makefile.modules.3rd"
-
-post-patch:
- @${REINPLACE_CMD} -e "s|/bin/mail|/usr/bin/mail|g" \
- ${WRKSRC}/mod_dosevasive.c ${WRKSRC}/mod_dosevasive20.c \
- ${WRKSRC}/mod_dosevasiveNSAPI.c
-
-post-install:
-.if !defined (NOPORTDOCS)
- @${MKDIR} ${DOCSDIR}
-. for f in ${PORTDOCS}
- @${INSTALL_DATA} ${WRKSRC}/${f} ${DOCSDIR}
-. endfor
-.endif
-
-.include <bsd.port.post.mk>
diff --git a/www/mod_evasive20/distinfo b/www/mod_evasive20/distinfo
deleted file mode 100644
index c7f767af1369..000000000000
--- a/www/mod_evasive20/distinfo
+++ /dev/null
@@ -1,3 +0,0 @@
-MD5 (apache2/mod_dosevasive_1.10.tar.gz) = 5e5eee54b3fba64c83898828693931ff
-SHA256 (apache2/mod_dosevasive_1.10.tar.gz) = 8706ff58be35378fce2b7a916cc2bce6249a00c79eaa09e3ebbdb163d4e87bb9
-SIZE (apache2/mod_dosevasive_1.10.tar.gz) = 19567
diff --git a/www/mod_evasive20/pkg-descr b/www/mod_evasive20/pkg-descr
deleted file mode 100644
index 338260dae53f..000000000000
--- a/www/mod_evasive20/pkg-descr
+++ /dev/null
@@ -1,30 +0,0 @@
-mod_dosevasive is an evasive maneuvers module for Apache to provide evasive
-action in the event of an HTTP DoS or DDoS attack or brute force attack.
-It is also designed to be a detection and network management tool, and can be
-easily configured to talk to ipchains, firewalls, routers, and etcetera.
-mod_dosevasive presently reports abuses via email and syslog facilities.
-
-Detection is performed by creating an internal dynamic hash table of IP
-Addresses and URIs, and denying any single IP address from any of the
-following:
-
- * Requesting the same page more than a few times per second
- * Making more than 50 concurrent requests on the same child per second
- * Making any requests while temporarily blacklisted (on a blocking list)
-
-This method has worked well in both single-server script attacks as well as
-distributed attacks, but just like other evasive tools, is only as useful to
-the point of bandwidth and processor consumption (e.g. the amount of bandwidth
-and processor required to receive/process/respond to invalid requests), which
-is why it's a good idea to integrate this with your firewalls and routers for
-maximum protection.
-
-This module instantiates for each listener individually, and therefore has a
-built-in cleanup mechanism and scaling capabilities. Because of this per-child
-design, legitimate requests are never compromised (even from proxies and NAT
-addresses) but only scripted attacks. Even a user repeatedly clicking on
-'reload' should not be affected unless they do it maliciously. mod_dosevasive
-is fully tweakable through the Apache configuration file, easy to incorporate
-into your web server, and easy to use.
-
-WWW: http://www.nuclearelephant.com/projects/dosevasive/