mirror of
https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker.git
synced 2025-09-03 19:20:16 +00:00
ADD OVER-RIDE BLOCKER / SUPER WHITELIST function into blockbots.conf TEST UNIT
This commit is contained in:
parent
df0907c055
commit
803b09c4b2
1 changed files with 28 additions and 14 deletions
|
@ -31,39 +31,53 @@
|
||||||
|
|
||||||
#######################################################################
|
#######################################################################
|
||||||
|
|
||||||
# ENABLE WHITELISTING TO WORK
|
# -----------------------------------
|
||||||
# This should over rule any other rule
|
# OVER-RIDE BLOCKER / SUPER WHITELIST
|
||||||
if ($remote_addr ~ "(127.0.0.1)" ) {
|
# -----------------------------------
|
||||||
#set $bad_bot '0';
|
# In this block you can allow any IP address specified here to over-ride any bad bot or IP blocking of the blocker.
|
||||||
set $validate_client '0';
|
# This is useful for testing or allowing only specific IP's (ie. Internal ranges) to never be blocked.
|
||||||
|
# More IP's can be added example > "(127.0.0.1)|(192.168.0.1)|(192.168.1.1)"
|
||||||
|
# If you even blacklisted 127.0.0.1 or your own IP by giving it a value of 1 in any of the includes, this will over-ride that block.
|
||||||
|
|
||||||
|
if ($remote_addr ~ "(127.0.0.1)|(192.168.0.1)" ) {
|
||||||
|
#set $bad_bot '0'; #Uncommenting this line will disable bad_bots functionality for specified IP(s)
|
||||||
|
set $validate_client '0'; #Uncommenting this line will disable validate_client ip blocking functionality for specified IP(s)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# --------------
|
||||||
|
# BLOCK BAD BOTS
|
||||||
|
# --------------
|
||||||
|
|
||||||
# BOTS
|
# Section bot_1 Unused
|
||||||
# ****
|
|
||||||
#limit_conn bot1_connlimit 100;
|
#limit_conn bot1_connlimit 100;
|
||||||
limit_conn bot2_connlimit 10;
|
|
||||||
#limit_req zone=bot1_reqlimitip burst=50;
|
#limit_req zone=bot1_reqlimitip burst=50;
|
||||||
|
|
||||||
|
limit_conn bot2_connlimit 10;
|
||||||
limit_req zone=bot2_reqlimitip burst=10;
|
limit_req zone=bot2_reqlimitip burst=10;
|
||||||
if ($bad_bot = '3') {
|
if ($bad_bot = '3') {
|
||||||
return 444;
|
return 444;
|
||||||
}
|
}
|
||||||
|
|
||||||
# BAD REFER WORDS
|
# ---------------------
|
||||||
# ***************
|
# BLOCK BAD REFER WORDS
|
||||||
|
# ---------------------
|
||||||
|
|
||||||
if ($bad_words) {
|
if ($bad_words) {
|
||||||
return 444;
|
return 444;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# ------------------
|
||||||
|
# BLOCK BAD REFERERS
|
||||||
|
# ------------------
|
||||||
|
|
||||||
# REFERERS
|
|
||||||
# ********
|
|
||||||
if ($bad_referer) {
|
if ($bad_referer) {
|
||||||
return 444;
|
return 444;
|
||||||
}
|
}
|
||||||
|
|
||||||
# IP BLOCKS
|
# -----------------------------
|
||||||
# *********
|
# BLOCK IP ADDRESSES and RANGES
|
||||||
|
# -----------------------------
|
||||||
|
|
||||||
if ($validate_client) {
|
if ($validate_client) {
|
||||||
return 444;
|
return 444;
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Reference in a new issue