From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on inbox.vuxu.org X-Spam-Level: X-Spam-Status: No, score=-0.0 required=5.0 tests=T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.4 Received: (qmail 12340 invoked from network); 5 Sep 2022 19:01:31 -0000 Received: from 9front.inri.net (168.235.81.73) by inbox.vuxu.org with ESMTPUTF8; 5 Sep 2022 19:01:31 -0000 Received: from maat.thinktankworkspaces.com ([45.79.94.76]) by 9front; Mon Sep 5 15:00:07 -0400 2022 Message-ID: To: 9front@9front.org Date: Mon, 05 Sep 2022 12:00:05 -0700 From: william@thinktankworkspaces.com MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7bit List-ID: <9front.9front.org> List-Help: X-Glyph: ➈ X-Bullshit: advanced open app ORM over ORM NoSQL-oriented general-purpose layer Subject: [9front] werc HTTP/1.1 Reply-To: 9front@9front.org Precedence: bulk Trying to get me head around this. So I can print or log HTTP_USER_AGENT but can I get REMOTE_ADDR or HTTP_HOST? It spits out nothing. How do I get that information? I just have a bunch of people from Russia hammering the server. I try to get the timestamp in /sys/log/www and then refererence with /sys/log/listen? Just wonder if I can leverage more of the HTTP header features from 1.1