We are currently under DDoS with the following vector: Attacker is establishing TLS connection then drop off. (No request line is being sent)
This is causing serious CPU load on nginx cluser. We have ngnix as reverse proxy. I could not figure out a way how to make nginx to log a fact that such a connection was established to automate IP based bans.
All the logging stuff I found require request to be parsed but in this case there is no payload at all so nothing shows up in both access and error logs...