I've had some DDoS issues - specifically the XML-RPC exploit (wordpress) wherein thousands on thousands of Wordpress instances attack my machine.
I have the following in my nginx server block: if ($http_user_agent ~ WordPress) { return 444; }
While it does terminate all of the wordpress connections, it still overloads the CPU.
Here are my server specs:
Ubuntu 16.04 LTS - E3-1230v5, 16G DDR4, and a SSD.
I would've assumed that it would be able to handle far more, but that doesn't appear to be the case. I have attempted to block the wordpress useragent automatically using fail2ban, but all that appeared to do is create a few thousand iptables rules and no end in sight.
Is there a more performant way to block this attack? Thanks.