(no title)
palsecam | 3 months ago
# Nothing to hack around here, I’m just a teapot:
location ~* \.(?:php|aspx?|jsp|dll|sql|bak)$ {
return 418;
}
error_page 418 /418.html;
No hard block, instead reply to bots the funny HTTP 418 code (https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/...). That makes filtering logs easier.Live example: https://FreeSolitaire.win/wp-login.php (NB: /wp-login.php is WordPress login URL, and it’s commonly blindly requested by bots searching for weak WordPress installs.)
jcynix|3 months ago
https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/...
kijin|3 months ago
palsecam|3 months ago
> You have an image on your error page, which some crappy bots will download over and over again.
Most bots won’t download subresources (almost none of them do, actually). The HTML page itself is lean (475 bytes); the image is an Easter egg for humans ;-) Moreover, I use a caching CDN (Cloudflare).
quesera|3 months ago
The LB will see the unresponded requests and think your webserver is failing.
Ideal would be to respond at the webserver and let the LB drop the response.
MadnessASAP|3 months ago
Be better if the scraper is left waiting for a packet that'll never arrive (till it times out obviously)