<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>DoS &#8211; 記下來</title>
	<atom:link href="https://noter.tw/tag/dos/feed/" rel="self" type="application/rss+xml" />
	<link>https://noter.tw</link>
	<description>一路上踩到的坑、遇到的問題，一點一滴記下來，希望能幫助到需要的人~</description>
	<lastBuildDate>Thu, 22 Jul 2021 02:25:05 +0000</lastBuildDate>
	<language>zh-TW</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.3</generator>

<image>
	<url>https://noter.tw/wp-content/uploads/cropped-old-1130742_1920-1-32x32.jpg</url>
	<title>DoS &#8211; 記下來</title>
	<link>https://noter.tw</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>xmlrpc.php 被攻擊了！Nginx 一個設定擋掉 DoS / DDoS 攻擊</title>
		<link>https://noter.tw/5585/xmlrpc-php-%e8%a2%ab%e6%94%bb%e6%93%8a%e4%ba%86%ef%bc%81nginx-%e4%b8%80%e5%80%8b%e8%a8%ad%e5%ae%9a%e6%93%8b%e6%8e%89-dos-ddos-%e6%94%bb%e6%93%8a/</link>
					<comments>https://noter.tw/5585/xmlrpc-php-%e8%a2%ab%e6%94%bb%e6%93%8a%e4%ba%86%ef%bc%81nginx-%e4%b8%80%e5%80%8b%e8%a8%ad%e5%ae%9a%e6%93%8b%e6%8e%89-dos-ddos-%e6%94%bb%e6%93%8a/#respond</comments>
		
		<dc:creator><![CDATA[黃小蛙]]></dc:creator>
		<pubDate>Sun, 01 Sep 2019 05:27:35 +0000</pubDate>
				<category><![CDATA[Web Server]]></category>
		<category><![CDATA[WordPress]]></category>
		<category><![CDATA[xmlrpc.xml]]></category>
		<category><![CDATA[攻擊]]></category>
		<category><![CDATA[資安]]></category>
		<category><![CDATA[log]]></category>
		<category><![CDATA[444]]></category>
		<category><![CDATA[nginx]]></category>
		<category><![CDATA[2019]]></category>
		<category><![CDATA[DoS]]></category>
		<category><![CDATA[DDoS]]></category>
		<guid isPermaLink="false">https://noter.tw/?p=5585</guid>

					<description><![CDATA[<p>小蛙有一天在翻 log 的時候突然看到一堆存取 xmlrpc.php 的記錄，源源不絕的出現，Google 了一下解法，大概記錄一下。 問題 大概長這樣，源源不絕噴出來～ DoS / DDoS 在維基&#46;&#46;&#46;</p>
<p>這篇文章 <a rel="nofollow" href="https://noter.tw/5585/xmlrpc-php-%e8%a2%ab%e6%94%bb%e6%93%8a%e4%ba%86%ef%bc%81nginx-%e4%b8%80%e5%80%8b%e8%a8%ad%e5%ae%9a%e6%93%8b%e6%8e%89-dos-ddos-%e6%94%bb%e6%93%8a/" data-wpel-link="internal">xmlrpc.php 被攻擊了！Nginx 一個設定擋掉 DoS / DDoS 攻擊</a> 最早出現於 <a rel="nofollow" href="https://noter.tw" data-wpel-link="internal">記下來</a>。</p>
]]></description>
										<content:encoded><![CDATA[
<p>小蛙有一天在翻 log 的時候突然看到一堆存取 xmlrpc.php 的記錄，源源不絕的出現，Google 了一下解法，大概記錄一下。</p>



<span id="more-5585"></span>



<h3 class="para wp-block-heading">問題</h3>



<p>大概長這樣，源源不絕噴出來～</p>



<div class="wp-block-image"><figure class="aligncenter"><img decoding="async" src="https://lh3.googleusercontent.com/3KDFhEgXQqV5xnNddnU6EPEcXtoInEIEbA31OLz9g6stnHLfFmyuE1URoS6jSROzERmftu7cnqoO5z-0w5xktXpbHLuuLnSKcB0EZ40oReXqOEAkcoHeysUwpJ0mrVvHNHheK9ks3olq3evrG0plAzDYbFOP0MWotxarthexkemsfJFl9zhAkVIrCeBRDnpJ3v-k64E7iMbO8PdfokSIKqJaRBbzNCFjeUtylEF0SsQA1NAQnMCKrYOT7kAvXODGVYu76MiG64ASeaWqmCRSWFKQ-tMORASab7e2cif3iKsca1vUa0nTxmekt19WTanDPKMHFYfWBaGEfciyEiupjewFVF639tP0CZANwn7_Ya4fjztdVBqRmPdVfi_1HRI1A-L3R4sVHj30-0d4eKm9fXuS_pRpGdJUdw9tjbOhAAbVzNWi-Di1zx1GLr7ViDUgi04cQsB1XU8fxfJUmU1vzoTzR2IyfUTP2kfQAT6twlg_FZ2W1fKr8RAcSdiY-o9QjDZ9aUxT2OU-mBtYxdcXOujdrnGye8Vf0WWhKzNRlc7EtuITpnI1GPlkcdTdiC5keGyT93OmuRyacmvVBoub69OSo2pxhVu2cVridwDo-roW3f-DnVS-j7jAY8qajjBnYlpZ-vL_XLo1WNJaJ9ECWc-IgPcaJdjJMSrSVQVKyVMogOj28yegowLFNkG0T7FIG8HHBc0SjETi2q1qLLU5TEM5Hw=w1383-h984-no" alt="3KDFhEgXQqV5xnNddnU6EPEcXtoInEIEbA31OLz9g6stnHLfFmyuE1URoS6jSROzERmftu7cnqoO5z 0w5xktXpbHLuuLnSKcB0EZ40oReXqOEAkcoHeysUwpJ0mrVvHNHheK9ks3olq3evrG0plAzDYbFOP0MWotxarthexkemsfJFl9zhAkVIrCeBRDnpJ3v k64E7iMbO8PdfokSIKqJaRBbzNCFjeUtylEF0SsQA1NAQnMCKrYOT7kAvXODGVYu76MiG64ASeaWqmCRSWFKQ tMORASab7e2cif3iKsca1vUa0nTxmekt19WTanDPKMHFYfWBaGEfciyEiupjewFVF639tP0CZANwn7 Ya4fjztdVBqRmPdVfi 1HRI1A L3R4sVHj30 0d4eKm9fXuS pRpGdJUdw9tjbOhAAbVzNWi Di1zx1GLr7ViDUgi04cQsB1XU8fxfJUmU1vzoTzR2IyfUTP2kfQAT6twlg FZ2W1fKr8RAcSdiY o9QjDZ9aUxT2OU mBtYxdcXOujdrnGye8Vf0WWhKzNRlc7EtuITpnI1GPlkcdTdiC5keGyT93OmuRyacmvVBoub69OSo2pxhVu2cVridwDo roW3f DnVS j7jAY8qajjBnYlpZ vL XLo1WNJaJ9ECWc IgPcaJdjJMSrSVQVKyVMogOj28yegowLFNkG0T7FIG8HHBc0SjETi2q1qLLU5TEM5Hw=w1383 h984 no xmlrpc.php 被攻擊了！Nginx 一個設定擋掉 DoS / DDoS 攻擊" title="xmlrpc.php 被攻擊了！Nginx 一個設定擋掉 DoS / DDoS 攻擊"></figure></div>



<p>DoS / DDoS 在維基百科的翻譯是</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p><strong>阻斷服務攻擊</strong>（英語：denial-of-service attack，簡稱<strong>DoS攻擊</strong>）亦稱<strong>洪水攻擊</strong>，是一種<a href="https://zh.wikipedia.org/wiki/%E7%B6%B2%E7%B5%A1%E6%94%BB%E6%93%8A" target="_blank" rel="noopener nofollow external noreferrer" data-wpel-link="external" class="wpel-icon-right">網路攻擊<span class="wpel-icon wpel-image wpel-icon-6"></span></a>手法，其目的在於使目標電腦的<a href="https://zh.wikipedia.org/wiki/%E7%B6%B2%E9%9A%9B%E7%B6%B2%E8%B7%AF" target="_blank" rel="noopener nofollow external noreferrer" data-wpel-link="external" class="wpel-icon-right">網路<span class="wpel-icon wpel-image wpel-icon-6"></span></a>或<a href="https://zh.wikipedia.org/wiki/%E7%B3%BB%E7%B5%B1" target="_blank" rel="noopener nofollow external noreferrer" data-wpel-link="external" class="wpel-icon-right">系統<span class="wpel-icon wpel-image wpel-icon-6"></span></a>資源耗盡，使服務暫時中斷或停止，導致其正常用戶無法存取。<br>當<a href="https://zh.wikipedia.org/wiki/%E9%BB%91%E5%AE%A2" target="_blank" rel="noopener nofollow external noreferrer" data-wpel-link="external" class="wpel-icon-right">駭客<span class="wpel-icon wpel-image wpel-icon-6"></span></a>使用網路上兩個或以上被攻陷的電腦作為「<a href="https://zh.wikipedia.org/wiki/%E6%AE%AD%E5%B1%8D%E9%9B%BB%E8%85%A6" target="_blank" rel="noopener nofollow external noreferrer" data-wpel-link="external" class="wpel-icon-right">殭屍<span class="wpel-icon wpel-image wpel-icon-6"></span></a>」向特定的目標發動「阻斷服務」式攻擊時，稱為<strong>分散式阻斷服務攻擊</strong>（distributed denial-of-service attack，簡稱<strong>DDoS攻擊</strong>）。 </p><cite><a href="https://zh.wikipedia.org/wiki/%E9%98%BB%E6%96%B7%E6%9C%8D%E5%8B%99%E6%94%BB%E6%93%8A" target="_blank" rel="noopener nofollow external noreferrer" data-wpel-link="external" class="wpel-icon-right">阻斷服務攻擊<span class="wpel-icon wpel-image wpel-icon-6"></span></a></cite></blockquote>



<h3 class="para wp-block-heading">解決方法</h3>



<p>小蛙有掛 Cloudflare CDN，標榜可以擋掉一些 DoS / DDoS，不過 log 裡還是能看到一大堆記錄，小蛙參考了兩篇文章，基本做法都差不多。</p>



<p>第一篇參考自 <a rel="noreferrer noopener nofollow external" aria-label="Deny Access to WordPress xmlrpc.php with NGINX (在新分頁中開啟)" href="http://www.jeedo.net/deny-access-to-wordpress-xmlrpc-php-with-nginx/" target="_blank" data-wpel-link="external" class="wpel-icon-right">Deny Access to WordPress xmlrpc.php with NGINX<span class="wpel-icon wpel-image wpel-icon-6"></span></a><br>第二篇參考自 <a rel="noreferrer noopener nofollow external" aria-label="資安：WordPress 禁止 xmlrpc.php 攻擊 (在新分頁中開啟)" href="https://shazi.info/%E8%B3%87%E5%AE%89%EF%BC%9Awordpress-%E7%A6%81%E6%AD%A2-xmlrpc-php-%E6%94%BB%E6%93%8A/" target="_blank" data-wpel-link="external" class="wpel-icon-right">資安：WordPress 禁止 xmlrpc.php 攻擊<span class="wpel-icon wpel-image wpel-icon-6"></span></a> </p>



<p>從 WordPress 3.5 以後，xmlrpc 預設是開啟的，記得很久以前小蛙的主機也被密集攻擊過一次</p>



<div class="wp-block-image"><figure class="aligncenter"><a href="https://lh3.googleusercontent.com/FhKs2UkzZvIaSjWZKS-amd5_dI-4uTeDohDkNOrRufWfiDkI9074_DADh7civNpwc3DdwmFInZ5gfcb9HZZkIDdtsgZ_WhgdHsl48MlRF9d2X8YFmTQ8eJu3Nd4ahHr4whSW4KAwyga-v45WD0U04bebwkhSFuM7Q2qehETsKzkJYDkDRbB88Jx-rs4_23btd4j2K2Jn9_zDWXeQiC6Dt9VjMQN-aKk8n68Tov0qJhh8Xi0txJeX5dz96wd-2OQd3YuDdoF1uTjCyX_ggGH5QW5s9LX2CnxGv2jYkKmRLJeamrXu8pM9uF116WDT6IO32dDK_5g2vp37G02o_99NPFWBittYcrYq5tMjeGfc6idyxOrdPGw6Y45B-pEBmXFkWOct__qAwFwtgF5DdVSc7_VgEJfN_JD98wBK3OtkR0m1idQAamgL2jkAmNiLG8tKdVkJKvy3yNnm1hNALzQrZYPTg1Nuonsnza0eKWdYLv68WWr3gvB6GG3xLGhGaky3PsS-BsDNJShWdZ-wM9bcNL-7C2CD_FXZA2HN75jn3VAqlB2Psm34Oznn8MVK63npxXnyNFnwNkudmK9DMrKhlcEn3av63SCNkQAJKQdEQLZad0ULMYMQOUDthedJNKJr3winGh1xBCddplRfn9BOu5tCKiNJoxJgjbETj89BOc8_fkxgREFq1e3GHzBE9LxkzT-ePd0zBZ7ZY7vlnZVAN_uCOxFFu7F9Ublv2tEM7Z0U0xw3=w652-h148-no" target="_blank" rel="noopener nofollow external noreferrer" data-wpel-link="external"><img decoding="async" src="https://lh3.googleusercontent.com/FhKs2UkzZvIaSjWZKS-amd5_dI-4uTeDohDkNOrRufWfiDkI9074_DADh7civNpwc3DdwmFInZ5gfcb9HZZkIDdtsgZ_WhgdHsl48MlRF9d2X8YFmTQ8eJu3Nd4ahHr4whSW4KAwyga-v45WD0U04bebwkhSFuM7Q2qehETsKzkJYDkDRbB88Jx-rs4_23btd4j2K2Jn9_zDWXeQiC6Dt9VjMQN-aKk8n68Tov0qJhh8Xi0txJeX5dz96wd-2OQd3YuDdoF1uTjCyX_ggGH5QW5s9LX2CnxGv2jYkKmRLJeamrXu8pM9uF116WDT6IO32dDK_5g2vp37G02o_99NPFWBittYcrYq5tMjeGfc6idyxOrdPGw6Y45B-pEBmXFkWOct__qAwFwtgF5DdVSc7_VgEJfN_JD98wBK3OtkR0m1idQAamgL2jkAmNiLG8tKdVkJKvy3yNnm1hNALzQrZYPTg1Nuonsnza0eKWdYLv68WWr3gvB6GG3xLGhGaky3PsS-BsDNJShWdZ-wM9bcNL-7C2CD_FXZA2HN75jn3VAqlB2Psm34Oznn8MVK63npxXnyNFnwNkudmK9DMrKhlcEn3av63SCNkQAJKQdEQLZad0ULMYMQOUDthedJNKJr3winGh1xBCddplRfn9BOu5tCKiNJoxJgjbETj89BOc8_fkxgREFq1e3GHzBE9LxkzT-ePd0zBZ7ZY7vlnZVAN_uCOxFFu7F9Ublv2tEM7Z0U0xw3=w652-h148-no" alt="FhKs2UkzZvIaSjWZKS amd5 dI 4uTeDohDkNOrRufWfiDkI9074 DADh7civNpwc3DdwmFInZ5gfcb9HZZkIDdtsgZ WhgdHsl48MlRF9d2X8YFmTQ8eJu3Nd4ahHr4whSW4KAwyga v45WD0U04bebwkhSFuM7Q2qehETsKzkJYDkDRbB88Jx rs4 23btd4j2K2Jn9 zDWXeQiC6Dt9VjMQN aKk8n68Tov0qJhh8Xi0txJeX5dz96wd 2OQd3YuDdoF1uTjCyX ggGH5QW5s9LX2CnxGv2jYkKmRLJeamrXu8pM9uF116WDT6IO32dDK 5g2vp37G02o 99NPFWBittYcrYq5tMjeGfc6idyxOrdPGw6Y45B pEBmXFkWOct qAwFwtgF5DdVSc7 VgEJfN JD98wBK3OtkR0m1idQAamgL2jkAmNiLG8tKdVkJKvy3yNnm1hNALzQrZYPTg1Nuonsnza0eKWdYLv68WWr3gvB6GG3xLGhGaky3PsS BsDNJShWdZ wM9bcNL 7C2CD FXZA2HN75jn3VAqlB2Psm34Oznn8MVK63npxXnyNFnwNkudmK9DMrKhlcEn3av63SCNkQAJKQdEQLZad0ULMYMQOUDthedJNKJr3winGh1xBCddplRfn9BOu5tCKiNJoxJgjbETj89BOc8 fkxgREFq1e3GHzBE9LxkzT ePd0zBZ7ZY7vlnZVAN uCOxFFu7F9Ublv2tEM7Z0U0xw3=w652 h148 no xmlrpc.php 被攻擊了！Nginx 一個設定擋掉 DoS / DDoS 攻擊" title="xmlrpc.php 被攻擊了！Nginx 一個設定擋掉 DoS / DDoS 攻擊"></a></figure></div>



<p>小蛙用的是 nginx，裡面可以設定當某個路徑被存取的時候，作相對應的動作，這邊我們確切知道就是 /xmlrpc.php 這支，所以就可以這樣寫</p>



<pre class="wp-block-preformatted wp-block-syntaxhighlighter-code">server {
  ...
  location = /xmlrpc.php {
    deny all;
    access_log off;
    log_not_found off;
    return 444; 
  }
}</pre>



<p>當被存取 xmlrpc.php 的時候，拒絕所有連線，把存取 log 跟找不到檔案 log 都關掉，最後回傳 444，而這個 444 <a href="https://zh.wikipedia.org/wiki/HTTP%E7%8A%B6%E6%80%81%E7%A0%81" target="_blank" rel="noreferrer noopener nofollow external" aria-label="維基百科 (在新分頁中開啟)" data-wpel-link="external" class="wpel-icon-right">維基百科<span class="wpel-icon wpel-image wpel-icon-6"></span></a>上的說明是 nginx 自己擴充的狀態碼。</p>



<div class="wp-block-image"><figure class="aligncenter"><img decoding="async" src="https://lh3.googleusercontent.com/XJ4orO2MZsURjfU6TrmCzHWPBR6Uq3ZS66qmx2iAuiqpZ33AIuLM1BngtEQK1pQx43p5XfPHYYjAWdzrAEk1typzGm2tcd32w6JWMs8ipNGdO8O2PqYzC82t-6L2fTCZ-ciy5sdZPOPivObmh-ga58BPeFzB8uuxzgL10RfVxHH4dc9vIBXO3Q8ZFR7yhkQ_nbe32Ve9BO5KX078TCz_H9ZszFaO7jPQdsg31m9-r55Q20sXIhAR3swpvWfW4HZFXe-J_8b9_nwURLU5lpg6eVREE-hXBJ1naGu_3z_GDzWGgOSgBWVSFCoqHY4lvx4n8rfu-QiJ84T6LK_AVxmruKinFCdwxIUwRHYMWoKHeHr-lT-SCakPKtIp5-Mi0qqhU3fotJHCjChzJbAlpjJUsckRuSVUFs6mHcc7hIm0ut6Nb6WYuC8kS0nf7unfV2AE1XnZxOxL6VedEsc2qK_J4e9fZ6B1ZIDwwvk1ZinOpl692jpdLz2BF8ly3IdmQaSy68HTfLJWCNrNPbJcKGfjatVuMvFcmM-Qbm5VHPzmbqQndV23371HAzjYcsib180DEQGk8SiUDUQttx34vlEqb6lh2YdgNviXHzhWh7D50r-hMXqQWg0yHMbztGUCD_OluQ9fVpUJczjIBU2ZPi15ePHowLrJhl_DvLYftCrsb6IzR_BCpPUx0bgP7fxRaOAMG8a_cDQuqHw3wxdHVMh1w_0H2w=w888-h332-no" alt="XJ4orO2MZsURjfU6TrmCzHWPBR6Uq3ZS66qmx2iAuiqpZ33AIuLM1BngtEQK1pQx43p5XfPHYYjAWdzrAEk1typzGm2tcd32w6JWMs8ipNGdO8O2PqYzC82t 6L2fTCZ ciy5sdZPOPivObmh ga58BPeFzB8uuxzgL10RfVxHH4dc9vIBXO3Q8ZFR7yhkQ nbe32Ve9BO5KX078TCz H9ZszFaO7jPQdsg31m9 r55Q20sXIhAR3swpvWfW4HZFXe J 8b9 nwURLU5lpg6eVREE hXBJ1naGu 3z GDzWGgOSgBWVSFCoqHY4lvx4n8rfu QiJ84T6LK AVxmruKinFCdwxIUwRHYMWoKHeHr lT SCakPKtIp5 Mi0qqhU3fotJHCjChzJbAlpjJUsckRuSVUFs6mHcc7hIm0ut6Nb6WYuC8kS0nf7unfV2AE1XnZxOxL6VedEsc2qK J4e9fZ6B1ZIDwwvk1ZinOpl692jpdLz2BF8ly3IdmQaSy68HTfLJWCNrNPbJcKGfjatVuMvFcmM Qbm5VHPzmbqQndV23371HAzjYcsib180DEQGk8SiUDUQttx34vlEqb6lh2YdgNviXHzhWh7D50r hMXqQWg0yHMbztGUCD OluQ9fVpUJczjIBU2ZPi15ePHowLrJhl DvLYftCrsb6IzR BCpPUx0bgP7fxRaOAMG8a cDQuqHw3wxdHVMh1w 0H2w=w888 h332 no xmlrpc.php 被攻擊了！Nginx 一個設定擋掉 DoS / DDoS 攻擊" title="xmlrpc.php 被攻擊了！Nginx 一個設定擋掉 DoS / DDoS 攻擊"></figure></div>



<p>雖然這樣 request 還是會進來，但是至少被 nginx 拒絕掉之後，不會因為大量執行 php，導致占用 CPU 跟記憶體，另外 <a rel="noreferrer noopener nofollow external" href="http://www.jeedo.net/deny-access-to-wordpress-xmlrpc-php-with-nginx/" target="_blank" data-wpel-link="external" class="wpel-icon-right">Deny Access to WordPress xmlrpc.php with NGINX<span class="wpel-icon wpel-image wpel-icon-6"></span></a> 最下面也有提到，用這個方法的話，會導致一些需要透過外部存取的插件失效，不過小蛙沒有用類似的套件，先解燃眉之急囉！這篇留在這邊給有需要的人或是未來換主機之後又遇到的自己。</p>
<p>這篇文章 <a rel="nofollow" href="https://noter.tw/5585/xmlrpc-php-%e8%a2%ab%e6%94%bb%e6%93%8a%e4%ba%86%ef%bc%81nginx-%e4%b8%80%e5%80%8b%e8%a8%ad%e5%ae%9a%e6%93%8b%e6%8e%89-dos-ddos-%e6%94%bb%e6%93%8a/" data-wpel-link="internal">xmlrpc.php 被攻擊了！Nginx 一個設定擋掉 DoS / DDoS 攻擊</a> 最早出現於 <a rel="nofollow" href="https://noter.tw" data-wpel-link="internal">記下來</a>。</p>
]]></content:encoded>
					
					<wfw:commentRss>https://noter.tw/5585/xmlrpc-php-%e8%a2%ab%e6%94%bb%e6%93%8a%e4%ba%86%ef%bc%81nginx-%e4%b8%80%e5%80%8b%e8%a8%ad%e5%ae%9a%e6%93%8b%e6%8e%89-dos-ddos-%e6%94%bb%e6%93%8a/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
