Hello,
I run a nginx instance handling only TLS1.2 and TLS1.3.
Now I noticed an remote client hammering (Ok, once per second) with an SSLv2 connection an thus filling the log:
2020/11/24 17:37:08 [info] 383#0: *11 SSL_do_handshake() failed (SSL: error:14209102:SSL routines:tls_early_post_process_client_hello:unsupported protocol) while SSL handshaking, client: 87.138.121.xx, server: 0.0.0.0:443
That's annoying.
beside blocking that IP in a firewall, is there a smart way to just prevent the log entry?
Thanks!
Andreas
_______________________________________________
nginx mailing list
nginx@nginx.org
http://mailman.nginx.org/mailman/listinfo/nginx