Results 1 to 22 of 22
Thread: PHP DDoS
-
12-05-2010, 12:39 AM #1Disabled
- Join Date
- Sep 2010
- Posts
- 627
PHP DDoS
Hi,
Lately I have been recieving DDoS attacks that are HTTP flooding my forum, memory usage goes up by 600MB, CPU usage goes to 100%, site stops loading (500 internal server error or blank page) and there are a LOT of php-fpm processes.
setup: nginx + php-fpm (latest versions)
This is my php-fpm config:
Code:; Start a new pool named 'www'. [www] ; The address on which to accept FastCGI requests. ; Valid syntaxes are: ; 'ip.add.re.ss:port' - to listen on a TCP socket to a specific address on ; a specific port; ; 'port' - to listen on a TCP socket to all addresses on a ; specific port; ; '/path/to/unix/socket' - to listen on a unix socket. ; Note: This value is mandatory. listen = 127.0.0.1:9000 ; Set listen(2) backlog. A value of '-1' means unlimited. ; Default Value: -1 ;listen.backlog = -1 ; List of ipv4 addresses of FastCGI clients which are allowed to connect. ; Equivalent to the FCGI_WEB_SERVER_ADDRS environment variable in the original ; PHP FCGI (5.2.2+). Makes sense only with a tcp listening socket. Each address ; must be separated by a comma. If this value is left blank, connections will be ; accepted from any ip address. ; Default Value: any listen.allowed_clients = 127.0.0.1 ; Set permissions for unix socket, if one is used. In Linux, read/write ; permissions must be set in order to allow connections from a web server. Many ; BSD-derived systems allow connections regardless of permissions. ; Default Values: user and group are set as the running user ; mode is set to 0666 ;listen.owner = nobody ;listen.group = nobody ;listen.mode = 0666 ; Unix user/group of processes ; Note: The user is mandatory. If the group is not set, the default user's group ; will be used. ; RPM: apache Choosed to be able to access some dir as httpd user = php ; RPM: Keep a group allowed to write in log dir. group = php ; Choose how the process manager will control the number of child processes. ; Possible Values: ; static - a fixed number (pm.max_children) of child processes; ; dynamic - the number of child processes are set dynamically based on the ; following directives: ; pm.max_children - the maximum number of children that can ; be alive at the same time. ; pm.start_servers - the number of children created on startup. ; pm.min_spare_servers - the minimum number of children in 'idle' ; state (waiting to process). If the number ; of 'idle' processes is less than this ; number then some children will be created. ; pm.max_spare_servers - the maximum number of children in 'idle' ; state (waiting to process). If the number ; of 'idle' processes is greater than this ; number then some children will be killed. ; Note: This value is mandatory. pm = dynamic ; The number of child processes to be created when pm is set to 'static' and the ; maximum number of child processes to be created when pm is set to 'dynamic'. ; This value sets the limit on the number of simultaneous requests that will be ; served. Equivalent to the ApacheMaxClients directive with mpm_prefork. ; Equivalent to the PHP_FCGI_CHILDREN environment variable in the original PHP ; CGI. ; Note: Used when pm is set to either 'static' or 'dynamic' ; Note: This value is mandatory. pm.max_children = 50 ; The number of child processes created on startup. ; Note: Used only when pm is set to 'dynamic' ; Default Value: min_spare_servers + (max_spare_servers - min_spare_servers) / 2 pm.start_servers = 2 ; The desired minimum number of idle server processes. ; Note: Used only when pm is set to 'dynamic' ; Note: Mandatory when pm is set to 'dynamic' pm.min_spare_servers = 2 ; The desired maximum number of idle server processes. ; Note: Used only when pm is set to 'dynamic' ; Note: Mandatory when pm is set to 'dynamic' pm.max_spare_servers = 5 ; The number of requests each child process should execute before respawning. ; This can be useful to work around memory leaks in 3rd party libraries. For ; endless request processing specify '0'. Equivalent to PHP_FCGI_MAX_REQUESTS. ; Default Value: 0 pm.max_requests = 500 ; The URI to view the FPM status page. If this value is not set, no URI will be ; recognized as a status page. By default, the status page shows the following ; information: ; accepted conn - the number of request accepted by the pool; ; pool - the name of the pool; ; process manager - static or dynamic; ; idle processes - the number of idle processes; ; active processes - the number of active processes; ; total processes - the number of idle + active processes. ; The values of 'idle processes', 'active processes' and 'total processes' are ; updated each second. The value of 'accepted conn' is updated in real time. ; Example output: ; accepted conn: 12073 ; pool: www ; process manager: static ; idle processes: 35 ; active processes: 65 ; total processes: 100 ; By default the status page output is formatted as text/plain. Passing either ; 'html' or 'json' as a query string will return the corresponding output ; syntax. Example: ; http://www.foo.bar/status ; http://www.foo.bar/status?json ; http://www.foo.bar/status?html ; Note: The value must start with a leading slash (/). The value can be ; anything, but it may not be a good idea to use the .php extension or it ; may conflict with a real PHP file. ; Default Value: not set ;pm.status_path = /status ; The ping URI to call the monitoring page of FPM. If this value is not set, no ; URI will be recognized as a ping page. This could be used to test from outside ; that FPM is alive and responding, or to ; - create a graph of FPM availability (rrd or such); ; - remove a server from a group if it is not responding (load balancing); ; - trigger alerts for the operating team (24/7). ; Note: The value must start with a leading slash (/). The value can be ; anything, but it may not be a good idea to use the .php extension or it ; may conflict with a real PHP file. ; Default Value: not set ;ping.path = /ping ; This directive may be used to customize the response of a ping request. The ; response is formatted as text/plain with a 200 response code. ; Default Value: pong ;ping.response = pong ; The timeout for serving a single request after which the worker process will ; be killed. This option should be used when the 'max_execution_time' ini option ; does not stop script execution for some reason. A value of '0' means 'off'. ; Available units: s(econds)(default), m(inutes), h(ours), or d(ays) ; Default Value: 0 ;request_terminate_timeout = 0 ; The timeout for serving a single request after which a PHP backtrace will be ; dumped to the 'slowlog' file. A value of '0s' means 'off'. ; Available units: s(econds)(default), m(inutes), h(ours), or d(ays) ; Default Value: 0 ;request_slowlog_timeout = 0 ; The log file for slow requests ; Default Value: /var/log/php-fpm.log.slow ;slowlog = /var/log/php-fpm.log.slow ; Set open file descriptor rlimit. ; Default Value: system defined value ;rlimit_files = 1024 ; Set max core size rlimit. ; Possible Values: 'unlimited' or an integer greater or equal to 0 ; Default Value: system defined value ;rlimit_core = 0 ; Chroot to this directory at the start. This value must be defined as an ; absolute path. When this value is not set, chroot is not used. ; Note: chrooting is a great security feature and should be used whenever ; possible. However, all PHP paths will be relative to the chroot ; (error_log, sessions.save_path, ...). ; Default Value: not set ;chroot = ; Chdir to this directory at the start. This value must be an absolute path. ; Default Value: current directory or / when chroot ;chdir = /var/www ; Redirect worker stdout and stderr into main error log. If not set, stdout and ; stderr will be redirected to /dev/null according to FastCGI specs. ; Default Value: no ;catch_workers_output = yes ; Pass environment variables like LD_LIBRARY_PATH. All $VARIABLEs are taken from ; the current environment. ; Default Value: clean env ;env[HOSTNAME] = $HOSTNAME ;env[PATH] = /usr/local/bin:/usr/bin:/bin ;env[TMP] = /tmp ;env[TMPDIR] = /tmp ;env[TEMP] = /tmp ; Additional php.ini defines, specific to this pool of workers. These settings ; overwrite the values previously defined in the php.ini. The directives are the ; same as the PHP SAPI: ; php_value/php_flag - you can set classic ini defines which can ; be overwritten from PHP call 'ini_set'. ; php_admin_value/php_admin_flag - these directives won't be overwritten by ; PHP call 'ini_set' ; For php_*flag, valid values are on, off, 1, 0, true, false, yes or no. ; Defining 'extension' will load the corresponding shared extension from ; extension_dir. Defining 'disable_functions' or 'disable_classes' will not ; overwrite previously defined php.ini values, but will append the new value ; instead. ; Default Value: nothing is defined by default except the values in php.ini and ; specified at startup with the -d argument ;php_admin_value[sendmail_path] = /usr/sbin/sendmail -t -i -f www@my.domain.com ;php_flag[display_errors] = off php_admin_value[error_log] = /var/log/php-fpm/www-error.log php_admin_flag[log_errors] = on ;php_admin_value[memory_limit] = 32M
-
12-05-2010, 01:06 AM #2CISSP-ISSMP, CISA
- Join Date
- Aug 2002
- Location
- Seattle
- Posts
- 5,525
Focus on stopping the traffic from reaching php. No amount of config tweaking is going to mitigate an attack of any sufficient size.
-
12-05-2010, 01:12 AM #3Disabled
- Join Date
- Sep 2010
- Posts
- 627
-
12-05-2010, 01:16 AM #4CISSP-ISSMP, CISA
- Join Date
- Aug 2002
- Location
- Seattle
- Posts
- 5,525
You could try using csf . Sometimes this type of self help works, other times even small attacks require professional mitigation.
-
12-05-2010, 04:36 AM #5Web Hosting Industry Expert
- Join Date
- Dec 2007
- Location
- Indiana, USA
- Posts
- 19,196
Without something in front of the server/webserver software to mitigate the attack there isn't going to be much you can do beyond perhaps replacing the dynamic content with static content temporarily until the attack subsides. If they're hitting something like index.php you can do a mod_rewrite to return an index.html instead of the .php which will be much less resource intensive.
█ Michael Denney - MDDHosting.com - Proudly hosting more than 37,700 websites since 2007.
█ Ultra-Fast Cloud Shared and Pay-By-Use Reseller Hosting Powered by LiteSpeed!
█ cPanel Free SSL 100% Uptime SLA 24/7 Support
█ Class-leading support that responds in minutes, not days.
-
12-05-2010, 04:43 AM #6Web Hosting Evangelist
- Join Date
- Aug 2008
- Posts
- 536
Install csf and for apache mod anti-loris attack, depending on the attack this can solve your problem.
-
12-05-2010, 04:45 AM #7Web Hosting Industry Expert
- Join Date
- Dec 2007
- Location
- Indiana, USA
- Posts
- 19,196
█ Michael Denney - MDDHosting.com - Proudly hosting more than 37,700 websites since 2007.
█ Ultra-Fast Cloud Shared and Pay-By-Use Reseller Hosting Powered by LiteSpeed!
█ cPanel Free SSL 100% Uptime SLA 24/7 Support
█ Class-leading support that responds in minutes, not days.
-
12-05-2010, 04:47 AM #8Web Hosting Evangelist
- Join Date
- Aug 2008
- Posts
- 536
-
12-05-2010, 04:48 AM #9Web Hosting Industry Expert
- Join Date
- Dec 2007
- Location
- Indiana, USA
- Posts
- 19,196
█ Michael Denney - MDDHosting.com - Proudly hosting more than 37,700 websites since 2007.
█ Ultra-Fast Cloud Shared and Pay-By-Use Reseller Hosting Powered by LiteSpeed!
█ cPanel Free SSL 100% Uptime SLA 24/7 Support
█ Class-leading support that responds in minutes, not days.
-
12-05-2010, 04:56 AM #10Disabled
- Join Date
- Sep 2010
- Posts
- 627
Just a note: I am using DDoS Deflator although it isn't helping.
-
12-05-2010, 04:57 AM #11Web Hosting Industry Expert
- Join Date
- Dec 2007
- Location
- Indiana, USA
- Posts
- 19,196
Software solutions such as those tend to not be really effective in my experiences. I've seen things like that and CSF actually cause more issues than they fixed under a decent DDoS. 10~12 MBPS may not sound like a lot, but when it's nothing but 1kb requests... That is actually quite a large number of requests/second.
█ Michael Denney - MDDHosting.com - Proudly hosting more than 37,700 websites since 2007.
█ Ultra-Fast Cloud Shared and Pay-By-Use Reseller Hosting Powered by LiteSpeed!
█ cPanel Free SSL 100% Uptime SLA 24/7 Support
█ Class-leading support that responds in minutes, not days.
-
12-05-2010, 05:18 AM #12Junior Guru
- Join Date
- Jun 2008
- Location
- Manchester, UK
- Posts
- 207
If you were to switch over to litespeed, it should help mitigate any attacks. Depending how popular the site is you could possibly temp take it offline or maybe look into the cloud?
Hope this helps!!
-
12-05-2010, 06:02 AM #13New Member
- Join Date
- Dec 2010
- Posts
- 2
Try to use CSF with "port flood control option" or IPTABLES to limit connections per second
/sbin/iptables -A INPUT -p tcp --dport 80 -i eth0 -m state --state NEW -m recent --set
/sbin/iptables -A INPUT -p tcp --dport 80 -i eth0 -m state --state NEW -m recent --update --seconds 100 --hitcount 60 -j DROP
this will help you i got same attack from few days .
-
12-05-2010, 05:34 PM #14Web Hosting Master
- Join Date
- Jun 2006
- Location
- NYC / Memphis, TN
- Posts
- 1,454
CSF is an iptables solution.
Any thing IPTables with an amount of traffic (number of IP's wise) that are bringing down the web server, it's likely iptables will not handle it either.
The linux kernel with iptables simply aren't resilient when it comes to handling any sort of attack traffic once you surpass a thousand or so IP's. Even a hundred requests/second different IP's, if it's a large amount of IP's, iptables will cause the box to get unstable.
You can try the listed rules above but you're still looking at a 'dumb' rule with no real validation of an attack. It simply blocks based on requests and if KeepAlive is off, that number will be hit with a site having a few images on it.
I'd suggest switching to BSD or get a solution with protection. The other option is simply try to withstand the attack without doing the blocking. You're using nginx? Properly configured nginx (even on linux) will handle upwards of 1500 requests/sec with the correct sysctl config.≈ PeakVPN.Com | Complete Privacy VPN | Cloud Hosting | Guaranteed Security | 1Gbps-10Gbps Unmetered
≈ PeakVPN | 31 VPN Servers | 17-Years Experience | Emergency 24/7 Support
≈ Visit us @ PeakVPN.Com (Coming SOON) | ASN: 3915
-
12-05-2010, 10:39 PM #15WHT Addict
- Join Date
- Nov 2010
- Location
- Casablanca
- Posts
- 153
You should think about a caching solution that will generate html pagesp (instead of executing php files) each time there is a modification.
-
12-05-2010, 11:18 PM #16WHT Addict
- Join Date
- Dec 2010
- Posts
- 166
-
12-05-2010, 11:22 PM #17Disabled
- Join Date
- Sep 2010
- Posts
- 627
Code:[root@web2 ~]# iptables -A INPUT -p tcp --dport 80 -i eth0 -m state --state NEW -m recent --set [root@web2 ~]# iptables -A INPUT -p tcp --dport 80 -i eth0 -m state --state NEW -m recent --update --seconds 100 --hitcount 60 -j DROP iptables: Unknown error 18446744073709551615 [root@web2 ~]#
-
12-06-2010, 12:04 AM #18WHT Addict
- Join Date
- Dec 2010
- Posts
- 166
does
iptables -L
work?
-
12-06-2010, 12:05 AM #19Disabled
- Join Date
- Sep 2010
- Posts
- 627
Code:[root@web2 /]# iptables -L Chain INPUT (policy ACCEPT) target prot opt source destination Chain FORWARD (policy ACCEPT) target prot opt source destination Chain OUTPUT (policy ACCEPT) target prot opt source destination Chain RH-Firewall-1-INPUT (0 references) target prot opt source destination [root@web2 /]#
-
12-06-2010, 12:16 AM #20WHT Addict
- Join Date
- Dec 2010
- Posts
- 166
-
12-06-2010, 01:19 AM #21New Member
- Join Date
- Dec 2010
- Posts
- 2
-
12-06-2010, 01:36 AM #22Web Hosting Industry Expert
- Join Date
- Dec 2007
- Location
- Indiana, USA
- Posts
- 19,196
█ Michael Denney - MDDHosting.com - Proudly hosting more than 37,700 websites since 2007.
█ Ultra-Fast Cloud Shared and Pay-By-Use Reseller Hosting Powered by LiteSpeed!
█ cPanel Free SSL 100% Uptime SLA 24/7 Support
█ Class-leading support that responds in minutes, not days.
Similar Threads
-
How To stop DDos & disabled functions in php latest
By sasky in forum VPS HostingReplies: 4Last Post: 08-12-2009, 03:16 AM -
Excitahost 30% OFF 30% MORE PHP 5 w/ Zend Optimizer Hardware Based DDoS Mitigation
By webenthusiast in forum Shared Hosting OffersReplies: 0Last Post: 11-21-2008, 09:20 AM -
Really Odd DDoS or something -> No log entries, over 2200+ PHP processes
By NuCode in forum Hosting Security and TechnologyReplies: 4Last Post: 04-09-2008, 07:17 PM -
Anti-DDOS php scripts?
By laydee in forum Web Design and ContentReplies: 6Last Post: 09-16-2007, 11:59 PM -
[Security] DDOS and IP flooding Protection Guaranteed for Php based Sites.
By bacanak in forum Employment / Job OffersReplies: 5Last Post: 10-31-2005, 02:29 AM