SPELL=mod_evasive VERSION=1.10.1 PATCHLEVEL=1 SOURCE=${SPELL}_$VERSION.tar.gz SOURCE_URL[0]=http://www.zdziarski.com/blog/wp-content/uploads/2010/02/$SOURCE SOURCE_HASH=sha512:03b276d1a3dc8e853ca7f3791d66383492a7ae8f3b73988f0eefa7e4e31f267da432e811de81c8d721033e152e94139efc99ad80da809f220a1330e9d43d39ba SOURCE_DIRECTORY="$BUILD_DIRECTORY/$SPELL" WEB_SITE=http://www.zdziarski.com/blog/?page_id=442 LICENSE[0]=GPL ENTERED=20091108 SHORT="evasive maneuvers module for Apache" cat << EOF mod_evasive is an evasive maneuvers module for Apache to provide evasive action in the event of an HTTP DoS or DDoS attack or brute force attack. It is also designed to be a detection and network management tool, and can be easily configured to talk to ipchains, firewalls, routers, and etcetera. mod_evasive presently reports abuses via email and syslog facilities. Detection is performed by creating an internal dynamic hash table of IP Addresses and URIs, and denying any single IP address from any of the following: * Requesting the same page more than a few times per second * Making more than 50 concurrent requests on the same child per second * Making any requests while temporarily blacklisted (on a blocking list) EOF .