Nginx Lua Redis防止CC攻擊
Nginx Lua Redis防止CC攻擊實現原理:同一個外網IP、同一個網址(ngx.var.request_uri)、同一個客戶端(http_user_agent)在某一段時間(CCseconds)內訪問某個網址(ngx.var.request_uri)超過指定次數(CCcount),則禁止這個外網IP+同一個客戶端(md5(IP+ngx.var.http_user_agent)訪問這個網址(ngx.var.request_uri)一段時間(blackseconds)。
該指令碼使用lua編寫(依賴nginx+lua),將資訊寫到redis(依賴redis.lua)。
Nginx lua模組安裝
pushd /root/oneinstack/src
wget -c http://nginx.org/download/nginx-1.10.3.tar.gz
wget -c http://mirrors.linuxeye.com/oneinstack/src/openssl-1.0.2k.tar.gz
wget -c http://mirrors.linuxeye.com/oneinstack/src/pcre-8.39.tar.gz
wget -c http://luajit.org/download/LuaJIT-2.0.4.tar.gz
git clone https://github.com/openresty/lua-nginx-module.git
tar xzf nginx-1.10.3.tar.gz
tar xzf openssl-1.0.2k.tar.gz
tar xzf pcre-8.39.tar.gz
tar xzf LuaJIT-2.0.4.tar.gz
pushd LuaJIT-2.0.4
make && make install
popd
pushd nginx-1.10.3
./configure --prefix=/usr/local/nginx --user=www --group=www --with-http_stub_status_module --with-http_v2_module --with-http_ssl_module --with-http_gzip_static_module --with-http_realip_module --with-http_flv_module --with-http_mp4_module --with-openssl=…/openssl-1.0.2k --with-pcre=…/pcre-8.39 --with-pcre-jit --with-ld-opt=-ljemalloc --add-module=…/ngx_cache_purge-2.3 --add-module=…/lua-nginx-module --add-module=…/ngx_devel_kit
mv /usr/local/nginx/sbin/nginx{,_bk}
cp objs/nginx /usr/local/nginx/sbin
nginx -t #檢查語法
載入redis.lua
mkdir /usr/local/nginx/conf/lua
cd /usr/local/nginx/conf/lua
wget https://github.com/openresty/lua-resty-redis/raw/master/lib/resty/redis.lua
http://groups.tianya.cn/post-208292-ed7f3aecdb414a9f98c77d8a395cd606-1.shtml
#the Nginx bundle:
lua_package_path “/usr/local/nginx/conf/lua/redis.lua;;”;
防止CC規則waf.lua
將下面內容儲存在/usr/local/nginx/conf/lua/waf.lua
local get_headers = ngx.req.get_headers
local ua = ngx.var.http_user_agent
local uri = ngx.var.request_uri
local url = ngx.var.host … uri
local redis = require ‘redis’
local red = redis.new()
local CCcount = 20
local CCseconds = 60
local RedisIP = ‘127.0.0.1’
local RedisPORT = 6379
local blackseconds = 7200
http://groups.tianya.cn/post-208292-1b688f36701a4b05953a747199758cc8-1.shtml
if ua == nil then
ua = “unknown”
end
if (uri == “/wp-admin.php”) then
CCcount=20
CCseconds=60
end
red:set_timeout(100)
local ok, err = red.connect(red, RedisIP, RedisPORT)
http://groups.tianya.cn/post-208292-35f39f6813e548fdbe02c9a4f8bccb4a-1.shtml
if ok then
red.connect(red, RedisIP, RedisPORT)
function getClientIp()
IP = ngx.req.get_headers()["X-Real-IP"]
if IP == nil then
IP = ngx.req.get_headers()["x_forwarded_for"]
end
if IP == nil then
IP = ngx.var.remote_addr
end
if IP == nil then
IP = "unknown"
end
return IP
end
local token = getClientIp() .. "." .. ngx.md5(url .. ua)
local req = red:exists(token)
if req == 0 then
red:incr(token)
red:expire(token,CCseconds)
else
local times = tonumber(red:get(token))
if times >= CCcount then
local blackReq = red:exists("black." .. token)
if (blackReq == 0) then
red:set("black." .. token,1)
red:expire("black." .. token,blackseconds)
red:expire(token,blackseconds)
ngx.exit(503)
else
ngx.exit(503)
end
return
else
red:incr(token)
end
end
return
end
Nginx虛擬主機載入waf.lua
在虛擬主機配置檔案/usr/local/nginx/conf/vhost/oneinstack.com.conf
access_by_lua_file “/usr/local/nginx/conf/lua/waf.lua”;
測試
一分鐘之內,一個頁面快速點選20次以上,登入redis,看到black開通的key即被禁止訪問(nginx 503)