Vo Duy dot Com
<voduydotcom@gmail.com>unread,May 2, 2022, 9:58:42 AM5/2/22Sign in to reply to author
Sign in to forward
You do not have permission to delete messages in this group
to [hoidap.voduy.com] Forum Support: Domain, Hosting, VPS, Server...
STEP 1: Install aaPanel (CentOS)
yum install -y wget && wget -O install.sh http://www.aapanel.com/script/install_6.0_en.sh && bash install.sh forum
(Install LAMP: Apache PHP MySQL)
More documentation:
https://forum.aapanel.com/d/9-aapanel-linux-panel-6812-installation-tutorialSTEP 2: Install vDDoS Proxy Protection
vDDoS Proxy Protection is free software to provide a Reverse Proxy Server HTTP(S) protocols. It act as a Layer 7 Firewall Filter & Mitigate DOS, DDOS, SYN Floods, or HTTP Floods attack to protect your website.
wget https://files.voduy.com/vDDoS-Proxy-Protection/latest.sh ; chmod 700 latest.sh ; bash latest.sh
More documentation:
https://vddos.voduy.comSTEP 3: Change Apache Default IP
By default aaPanel LAMP uses Apache running on IP port
0.0.0.0:80, 0.0.0.0:443. We can reconfigure these Webservers to listen on another IP so that vDDoS can proxy on them.
[NOTE: you need to add at least 1 website (HTTPS) to aaPanel before continuing (you can use self-signed ssl certificate)]
Change Apache Default IP:
cp /www/server/apache/conf/httpd.conf /www/server/apache/conf/httpd.conf.vddosbak
nano /www/server/apache/conf/httpd.confFind: Listen 80
Listen 443Change to:Listen 127.0.0.1:80
Listen 127.0.0.1:443Save & Restart Apache:
service httpd restart
Re-Check Apache port:
[root@aaPanel ~]# netstat -lntup|grep httpd
tcp 0 0 127.0.0.1:443 0.0.0.0:* LISTEN 2738/httpd
tcp 0 0 127.0.0.1:80 0.0.0.0:* LISTEN 2738/httpd
tcp6 0 0 :::888 :::* LISTEN 2738/httpdSTEP 4: Config vDDoS Proxy Protection
For example, the IP Addr of your server is
1.2.3.4:
nano /vddos/conf.d/website.conf
# Website Listen Backend Cache Security SSL-Prikey SSL-CRTkey
default http://1.2.3.4:80 http://127.0.0.1:80 no no no no
default https://1.2.3.4:443 https://127.0.0.1:443 no no /vddos/ssl/your-domain.com.pri /vddos/ssl/your-domain.com.crtRestart vDDoS service after you have configured:
/usr/bin/vddos restartSTEP 5: Config vDDoS Auto AddvDDoS Auto Add is a addon support for vDDoS Proxy Protection - Monitor Domains/Aliasdomains/Subdomains in Panel Hosting, Web Server, List Domain, Virtual Host... and automatically add them into the website.conf file.
nano /vddos/auto-add/setting.conf
# Default Setting for vddos-add command:
SSL auto
DNS_sleep 66
DNS_alias_mode no
Cache no
Security no
HTTP_Listen http://1.2.3.4:80
HTTPS_Listen https://1.2.3.4:443
HTTP_Backend http://127.0.0.1:80
HTTPS_Backend https://127.0.0.1:443Set Crontab:
echo '*/15 * * * * root /usr/bin/vddos-autoadd webserver apache' >> /etc/crontab
STEP 6: Config vDDoS Auto Switch
vDDoS Auto Switch is a addon support for vDDoS Proxy Protection - Automatically identifies overloaded websites and changes their Security Mode.
nano /vddos/auto-switch/setting.conf
# This is the default configuration for "sensor-switch.sh" and "vddos-autoswitch.sh"
hostname="vDDoS Master" #(Name this server, it will show up in Email notifications)
vddos_master_slave_mode="no" #(Turn on "yes" if your system has slave servers, want to sync affter switch like master)
backend_url_check="no" #(Put the URL of the backend. Ex: https://1.1.1.1:8443/ (make sure Backend status response is "200"))
send_notifications="no" #(Turn on "yes" if you want receive notification)
smtp_server="smtps://smtp.gmail.com" #(SMTP Server)
smtp_username="x...@gmail.com" #(Your Mail)
smtp_password="xxxxxxxxxxxxx" #(Get your Apps password for Gmail from https://security.google.com/settings/security/apppasswords)
send_notifications_to="xx...@gmail.com" #(Your Email Address will receive notification)
maximum_allowable_delay_for_backend=2 #(Means: If Backend (status response "200") is slower than 2s, vDDoS will enable challenge mode)
maximum_allowable_delay_for_website=2 #(Means: If Website (status response "200") is slower than 2s, vDDoS will enable challenge mode)
default_switch_mode_not_attack="no" #(Default Mode vDDoS use when it's not under attacked)
default_switch_mode_under_attack="high" #(Default Mode vDDoS use when it's under attack)
default_waiting_time_to_release="60" #(For example 60 minutes, release time from challenge)Crontab vDDoS Auto Switch:
echo '*/5 * * * * root /usr/bin/vddos-autoswitch checkalldomain high' >> /etc/crontab
echo '0 */3 * * * root /usr/bin/vddos-switch allsite no && /usr/bin/vddos reload' >> /etc/crontab
echo '* * * * * root /usr/bin/vddos-sensor' >> /etc/crontabMore documentation:
https://github.com/duy13/vDDoS-Auto-Switch