Bug #16227 | Limit the number of unauthenticated users from the same IP address | ||
---|---|---|---|
Submitted: | 5 Jan 2006 15:01 | Modified: | 2 Feb 2012 12:31 |
Reporter: | Cyril Bouthors | Email Updates: | |
Status: | Verified | Impact on me: | |
Category: | MySQL Server: General | Severity: | S4 (Feature request) |
Version: | 4.1 | OS: | Linux (Debian GNU/Linux) |
Assigned to: | CPU Architecture: | Any |
[5 Jan 2006 15:01]
Cyril Bouthors
[5 Jan 2006 15:51]
Valeriy Kravchuk
Thank you for a (useful) feature request. I believe, something similar can be achieved by proper (not stateless) firewall usage and settings, but yes, the more levels of seŃurity you have against DoS attack, the better.
[13 Dec 2006 12:54]
Roel Broersma (www.Gigaweb.nl)
We recently had the same problem. We're running and ISP with Public MySQL Access too. You need quite an advanced firewall to intercept this DOS attach (or accidental loop from one of your customers). the bind-address variable in the MY.CNF file is also only capable of 1 IP address or hostname so you can't solve it with this one. There is also no a KILL-LIST file or variable in which you can put blacklisted IP Address/hostnames.
[25 Sep 2009 9:30]
Aleksandar Kostadinov
How would such a limit help? if the number is reached, new connections will not be possible anyways. So a better solution would be to limit the number of connections (unauthenticated only probably) from the same IP
[25 Sep 2009 10:08]
Cyril Bouthors
(3 years later) Yes, it's a better fix. Would it be possible to do?
[2 Feb 2012 12:31]
Cyril Bouthors
It's been SIX years since I opened this bug. 3 years since the last comment. Is MySQL dead ?