如何保护垃圾邮件发送者免受apache攻击?

时间:2010-11-23 00:20:26

标签: virtualhost apache

www.domain.comlogin.domain.com我有以下内容。但垃圾邮件发送者会将网站转发到login.domain.com并且可以正常运行。我怎么能阻止他们?

Ex:http://spammerexmaple.sex.com打开http://login.domain.com(我想屏蔽此内容)

<VirtualHost *:80>
 ServerName login.domain.com
 ServerAlias login.domain.com
 DocumentRoot /var/www/html/com/public
 <Directory /var/www/html/com/public>
        #AddDefaultCharset utf-8
        DirectoryIndex index.php
        AllowOverride All
        Order allow,deny
        Allow from all
 </Directory>

</VirtualHost>


<VirtualHost *:80>
 ServerName www.domain.com
 ServerAlias domain.com
 DocumentRoot /var/www/html/www/public
 <Directory /var/www/html/www/public>
    # Compress output
    AddOutputFilterByType DEFLATE text/html text/css text/plain text/xml application/x-javascript
    BrowserMatch ^Mozilla/4 gzip-only-text/html
    BrowserMatch ^Mozilla/4.0[678] no-gzip
    BrowserMatch bMSIE !no-gzip !gzip-only-text/html

        #AddDefaultCharset utf-8
        DirectoryIndex index.php
        AllowOverride All
        Order allow,deny
        Allow from all
 </Directory>

</VirtualHost>

跟进:

垃圾邮件发送者将www.spammer.com转发给login.domain.comwww.spammer.sex.com任何人都可以转发到login.domain.com并且有效。

我怎么能阻止这个?

[root@d dd.dd.com]# httpd -S
VirtualHost configuration:
wildcard NameVirtualHosts and _default_ servers:
_default_:443          d (/etc/httpd/conf.d/ssl.conf:81)
*:80                   is a NameVirtualHost
         default server dummy.com (/etc/httpd/conf/httpd.conf:1028)
         port 80 namevhost dummy.com (/etc/httpd/conf/httpd.conf:1028)
         port 80 namevhost dd.dd.com (/etc/httpd/conf/httpd.conf:1039)
         port 80 namevhost aa.aa.com (/etc/httpd/conf/httpd.conf:1058)
Syntax OK





<VirtualHost *:80>
 ServerName dummy.com
 DocumentRoot /tmp
 <Directory /tmp>
        deny from all
 </Directory>

</VirtualHost>

<VirtualHost *:80>
 ServerName dd.dd.com
 #ServerAlias dd.dd.com
 DocumentRoot /var/www/html/dd.dd.com/public
 <Directory /var/www/html/dd.dd.com/public>
        #AddDefaultCharset utf-8
        DirectoryIndex index.php
        AllowOverride All
        Order allow,deny
        Allow from all
 </Directory>

</VirtualHost>


<VirtualHost *:80>
 ServerName aa.aa.com
 ServerAlias aa.com
 DocumentRoot /var/www/html/aa.aa.com/public
 <Directory /var/www/html/aa.aa.com/public>
    # Compress output
    AddOutputFilterByType DEFLATE text/html text/css text/plain text/xml application/x-javascript
    BrowserMatch ^Mozilla/4 gzip-only-text/html
    BrowserMatch ^Mozilla/4.0[678] no-gzip
    BrowserMatch bMSIE !no-gzip !gzip-only-text/html

        #AddDefaultCharset utf-8
        DirectoryIndex index.php
        AllowOverride All
        Order allow,deny
        Allow from all
 </Directory>

1 个答案:

答案 0 :(得分:0)

行动1:Iptables是最好的+物理路由器,例如Cisco Pix或其他路由器,并制作黑名单+使用黑名单的IP网络检查传入的源IP,并暂停访问我们的网络。

行动2:安排一些主持人,他们屏蔽传入的流量并尽快退回并将其标记为垃圾邮件发送者,并将其报告给其他网络

行动3:上帝保佑我们,并希望我们获得更多信息......它是一场无限制的游戏,永无止境。

希望它能帮助别人 - 至少知道可能性。