By the time you get to UA, nginx has done a lot of work.
You could 444 based on UA, then read that code in the log file with fail2ban or a clever script. That way you can block them at the firewall. It won't help immediately with the sequential number, but that really won't be a problem.
Original Message
From: Grant
Sent: Wednesday, December 14, 2016 2:15 PM
To: nginx@nginx.org
Reply To: nginx@nginx.org
Subject: Re: limit_req per subnet?
>> I rate limit them using the user-agent
>
>
> Maybe this is the best solution, although of course it doesn't rate
> limit real attackers. Is there a good method for monitoring which UAs
> request pages above a certain rate so I can write a limit for them?
Actually, is there a way to limit rate by UA on the fly? If so, can I
do that and somehow avoid limiting multiple legitimate browsers with
the same UA?
- Grant
_______________________________________________
nginx mailing list
nginx@nginx.org
http://mailman.nginx.org/mailman/listinfo/nginx
_______________________________________________
nginx mailing list
nginx@nginx.org
http://mailman.nginx.org/mailman/listinfo/nginx