$ apt-get install libreadline-dev libncurses5-dev libpcre3-dev libssl-dev perl make build-essential
编译安装Nginx并添加Naxsi模块
12345
$ tar xzvf naxsi-0.55.3.tar.gz$ tar xzvf nginx-1.9.2.tar.gz$ cd nginx-1.9.2$ ./configure --add-module=/root/naxsi-0.55.3/naxsi_src/$ make && make install
$ /usr/local/nginx/sbin/nginx -tnginx: the configuration file /usr/local/nginx/conf/nginx.conf syntax is oknginx: configuration file /usr/local/nginx/conf/nginx.conf test is successful
CloudFlare的流速控制有点贵,应付小规模的ddos攻击,用fail2ban就行了,刚开始会断一下,但随着对攻击ip的收集并提交给CloudFlare,攻击会被CloudFlare的防火墙挡掉。 https://guides.wp-bullet.com/integrate-fail2ban-cloudflare-api-v4-guide/ CloudFlare is a pretty sweet free security, firewall and acceleration service that I use on all my WordPress sites. The old CloudFlare API is being retired shortly (November 2016, source ). Since the CloudFlare v4 API is already live, I wanted to be prepared for the new API switch. I use fail2ban to protect my wp-login with basic HTTP authentication ( nginx , Apache ) and D(D)oS protection from hacker bots that slam wp-login and xmlrpc.php. When you use CloudFlare, it will route all safe traffic to your web server unless you block certain IPs. Blocking IPs on my web servers alone is therefore not sufficient. Luckily fail2ban support custom actions so I wrote this integration with CloudFlare’s API v4 so CloudFlare won’t send unwanted traffic to my servers. I...
评论
发表评论