Version 9.11 of the Hiawatha webserver has been released. This release brings the ChallengeClient option, which gives Hiawatha the ability to reduce the effects of a DDoS attack. This is done by checking if the client has a certain cookie set. If this is not the case for the first request within a connection, Hiawatha sends a 307 and this cookie (via a Set-Cookie HTTP header or a Javascript) back to the client. If the second request within a connection doesn't has this cookie, the client is banned. The idea is that normal browsers understand the 307 and the HTTP Set-Cookie header or the Javascript, but HTTP bots don't.
Please note that this although this option works from a technical point of view, it should be used with great care. Proper testing is strongly advised. Also note that this option should only be used when options like ConnectionsPerIP, ReconnectDelay and BanOnFlooding are insufficient.
Many thanks to Andrey Vasilev and Chris Wadge for all the testing and feedback.
As usual, files.tuxhelp.org [files.tuxhelp.org] has the latest Debian builds available, and both the US [mirror.tuxhelp.org] and EU [apt.sparkz.no] mirrors are synced as well.
Enjoy
excellent work, does a incredible job on my linux machines.
But unfortunately FreeBSD still hangs in version 9.8
Can you maybe take on any influence and help out a little bit?
Thanks in advance.
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=197205