In Linux operations, you sometimes encounter website users who use proxy ip to access. This requires configuring Nginx to restrict access. The following small series will introduce you to how to configure Nginx in Linux system to refuse proxy ip access.
Let's talk about simple structure … a Nginx reverse proxy on the front end, and a Nginx instance app for PHP&hellip on the back end; actually it is a Discuz. Before the CC attack, it is an alert script or a CDN. But this time the attacker no longer hits traffic, but attacks against the database request page, such as search operation … post ID F5. . From the log analysis, it was attacked from 3 URLs. At that time, Nginx was used to match $query_string to return 503… however, the page could not be accessed, so I thought of such a compromise.
First of all, you can see the log of a proxy request:
## Through analysis, the data that the proxy accesses are found on the backend are two IPs. By default, the direct access is true. IP, its IP has only one, and the Internet access through mobile phone 3G\\4G is 2 IP, but if there is an anonymous IP, there is only one IP to the server, which is not very good judgment. . .
[root@ipython conf]# tail -f /var/log/nginx/logs/access.log
The rename command in the Linux command is mainly used to rename files. It is simil
Linux under the symbolic link is what we usually call soft links, and hard links ar
In the Ubuntu command, the useradd command can be used to create users, and the add
of creating a shared folder by SUSE SUSE is a Linux operating system. To share a SUSE file on other
What should I do if libpng fails to compile after Gentoo upgrade?
How to detect when Linux system is invaded?
How to back up and restore Linux file permissions
How Linux System Supervisor manages processes
How to deal with the dead loop of user state process under Linux
Linux uptime command operation example
Debian install closed source package method
Amazon Amazon AWS Access Key Creation Tutorial
Introduction to multi-threaded shell scripts in Linux system
Linux how to use the command to update the file directory time
How to open the registry in win7 system?
Various methods for automatic deletion of mailbox spam
Win10 how to automatically switch desktop wallpaper
Linux-Windows "two-in-one" computer debuted at
Microsoft Releases Win8 "Inside" Crisis Innovation Subverts Tradition
CNET recommends Microsoft Windows 8 to provide startup project management tools
Win10 new briefcase option recovery method
Windows XP can't complete defragmentation