From 615414f5ffb167e4a3871bee9858a2c95f31723d Mon Sep 17 00:00:00 2001
From: "lpsolit%gmail.com" <>
Date: Mon, 3 Sep 2007 15:12:04 +0000
Subject: [PATCH] Bug 380730: Remove documentation about the withdrawn
 mod_throttle module - Patch by samfw <sam.folkwilliams@gmail.com> r=mkanat

---
 docs/xml/glossary.xml |  4 +---
 docs/xml/security.xml | 29 +----------------------------
 2 files changed, 2 insertions(+), 31 deletions(-)

diff --git a/docs/xml/glossary.xml b/docs/xml/glossary.xml
index 376b48cff..5b6d1a6e7 100644
--- a/docs/xml/glossary.xml
+++ b/docs/xml/glossary.xml
@@ -215,9 +215,7 @@
       <glossdef>
         <para>A DOS, or Denial of Service attack, is when a user attempts to
         deny access to a web server by repeatedly accessing a page or sending
-        malformed requests to a webserver. This can be effectively prevented
-        by using <filename>mod_throttle</filename> as described in
-        <xref linkend="security-webserver-mod-throttle"/>. A D-DOS, or
+        malformed requests to a webserver. A D-DOS, or
         Distributed Denial of Service attack, is when these requests come
         from multiple sources at the same time. Unfortunately, these are much
         more difficult to defend against.
diff --git a/docs/xml/security.xml b/docs/xml/security.xml
index e7ea0f30c..651b45241 100644
--- a/docs/xml/security.xml
+++ b/docs/xml/security.xml
@@ -1,5 +1,5 @@
 <!-- <!DOCTYPE chapter PUBLIC "-//OASIS//DTD DocBook XML V4.1.2//EN"> -->
-<!-- $Id: security.xml,v 1.17 2007/07/24 18:22:02 timeless%mozdev.org Exp $ -->
+<!-- $Id: security.xml,v 1.18 2007/09/03 10:12:04 lpsolit%gmail.com Exp $ -->
 
 <chapter id="security">
 <title>Bugzilla Security</title>
@@ -310,33 +310,6 @@ skip-networking
     
     </section>
 
-
-    <section id="security-webserver-mod-throttle">
-      <title>Using <filename>mod_throttle</filename> to Prevent a DOS</title>
-
-      <note>
-        <para>This section only applies to people who have chosen the Apache
-        webserver. It may be possible to do similar things with other
-        webservers. Consult the documentation that came with your webserver
-        to find out.
-        </para>
-      </note>
-
-      <para>It is possible for a user, by mistake or on purpose, to access
-      the database many times in a row which can result in very slow access
-      speeds for other users (effectively, a
-      <glossterm linkend="gloss-dos">DOS</glossterm> attack). If your
-      Bugzilla installation is experiencing this problem, you may install
-      the Apache module <filename>mod_throttle</filename> which can limit
-      connections by IP address. You may download this module at 
-      <ulink url="http://www.snert.com/Software/mod_throttle/"/>.
-      Follow the instructions to install into your Apache install. 
-      The command you need is 
-      <command>ThrottleClientIP</command>. See the 
-      <ulink url="http://www.snert.com/Software/mod_throttle/">documentation</ulink>
-      for more information.</para>
-    </section>
-
       
   </section>
   
-- 
2.24.1