One of our Mac Pro machines running Apache was inadvertently acting as a forward proxy with a public IP, after some organisation proxy rules changed.
Consequently it was discovered by spammers and since then has been hammered on all sorts of ports by all sorts of IP addresses.
I've locked down the Apache proxy settings, and set up highly restrictive ipfw
rules to deny all access outside our private network (using NoobProof) .
Is there anything else I should do to secure the server, or reduce the amount of requests coming through?
My team uses the machine for a number of applications, so it would be good to minimise downtime, and still allow them to access the same URL if I need to change the IP address.
A combination of blockhosts and mod_evasive have always worked very well for me, though once you have closed up all the holes, the spurious connections should drop off pretty rapidly. Changing IP may help, but may not be worth the effort if it's a public address since many of your attacks are possibly pointed at the name rather than the ip address.