Indeed, speculative TCP pre-connections are a problem. That's why you should configure QS_SrvMinDataRate to become active when the server as very few free connections only.
It might also help to increase QS_SrvSampleRate (to let browsers close the unnused connection before mod_qos closes them).
If you would like to refer to this comment somewhere else in this project, copy and paste the following link:
We have seen problem when using QS_SrvMinDataRate in combination with QS_Block as suggested here: http://mod-qos.sourceforge.net/dos.html#repeat-offender. This is blocking a lot of legitimate traffic.
We see lots of entries like the following where mod_qos says no traffic is sent at all from sources we know to be legitimate.
Our assumtion is that this is due to browser optimizing loadtimes by preemtively opening connections without ever using them.
If this is the case, the directive QS_SrvMinDataRate is acting as it is supposed to but using it in combination with QS_Block becomes impractical.
Has anyone else experienced this?
Indeed, speculative TCP pre-connections are a problem. That's why you should configure QS_SrvMinDataRate to become active when the server as very few free connections only.
It might also help to increase QS_SrvSampleRate (to let browsers close the unnused connection before mod_qos closes them).
Thanks for the feedback.