changed: when a client doesn't send a session cookie we can instead of ban just use a temporary session
added: config option: // the way we behave when no_session_cookie_treshold limit is exceeded // 0 - if a client doesn't send a session cookie again then use a temporary session // (other sessions from this IP address are not affected) // 1 - add this IP address to ban list and create a temporary session // (this will block other sessions from this IP address too) // default: 0 int no_session_cookie_ban_mode; git-svn-id: svn://ttmath.org/publicrep/winix/trunk@996 e52654a7-88a9-db11-a3e9-0013d4bc506e
This commit is contained in:
@@ -244,9 +244,18 @@ public:
|
||||
size_t session_hijacking_treshold;
|
||||
|
||||
// after how many times a client will be banned if it did not send a session cookie
|
||||
// default: 1000 (value in the range <0 - 65535>)
|
||||
// this can be a bot such as a Google Bot or just people connecting from a NAT and all have the same IP
|
||||
// default: 128 (value in the range <0 - 65535>)
|
||||
size_t no_session_cookie_treshold;
|
||||
|
||||
// the way we behave when no_session_cookie_treshold limit is exceeded
|
||||
// 0 - if a client doesn't send a session cookie again then use a temporary session
|
||||
// (other sessions from this IP address are not affected)
|
||||
// 1 - add this IP address to ban list and create a temporary session
|
||||
// (this will block other sessions from this IP address too)
|
||||
// default: 0
|
||||
int no_session_cookie_ban_mode;
|
||||
|
||||
// allow the winix output to be compressed
|
||||
// default: true
|
||||
bool compression;
|
||||
|
Reference in New Issue
Block a user