With this module, apache is protected against the slowloris attack. The module limits the number of threads in READ state on a per IP basis.

Project Activity

See All Activity >

Categories

Follow mod_antiloris

mod_antiloris Web Site

Other Useful Business Software

The First VoIP Communications Cloud in the World The First VoIP Communications Cloud in the World Icon
The First VoIP Communications Cloud in the World Icon

The Smarter Business Phone Solution

  • Powerful Unified Communication Features
  • Fast, Easy, Free Setup & Install
  • Trusted by 47,000+ Companies in 100 Countries

Rate This Project

Login To Rate This Project

User Ratings

★★★★★
★★★★
★★★
★★
2
0
0
0
0
ease 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 0 / 5
features 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 0 / 5
design 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 0 / 5
support 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 0 / 5

User Reviews

  • just found a very questionable code in it. in pre-connection function, if (ip_count > conf->limit) { ap_log_error(APLOG_MARK, APLOG_WARNING, 0, NULL, "Rejected, too many connections in READ state from %s", c->remote_ip); return OK; } else { return DECLINED; } looks like it will reject all legit requests. i'm confused....

  • Good work:)

Read more reviews >

Additional Project Details

Intended Audience

System Administrators

Programming Language

C

Registered

2010-06-27