From owner-freebsd-questions@FreeBSD.ORG Wed May 28 08:12:34 2008 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 1709010656C7 for ; Wed, 28 May 2008 08:12:34 +0000 (UTC) (envelope-from i.tanusheff@procreditbank.bg) Received: from mail.procreditbank.bg (mail.procreditbank.bg [193.26.216.3]) by mx1.freebsd.org (Postfix) with SMTP id E538C8FC12 for ; Wed, 28 May 2008 08:12:28 +0000 (UTC) (envelope-from i.tanusheff@procreditbank.bg) Received: (qmail 4658 invoked from network); 28 May 2008 11:28:59 +0300 Received: from unknown (HELO domino.procreditbank.bg) (10.0.0.15) by 192.168.1.3 with SMTP; 28 May 2008 11:28:59 +0300 In-Reply-To: <483CB6F3.5040505@muliahost.com> To: Kalpin Erlangga Silaen MIME-Version: 1.0 X-Mailer: Lotus Notes Release 7.0.2 September 26, 2006 From: Ivailo Tanusheff Message-ID: Date: Wed, 28 May 2008 11:12:26 +0300 X-MIMETrack: Serialize by Router on DOMINO/BULGARIA/PROCREDITBANK(Release 7.0.2FP2|May 14, 2007) at 28.05.2008 11:12:26, Serialize complete at 28.05.2008 11:12:26 Content-Type: text/plain; charset="US-ASCII" X-Content-Filtered-By: Mailman/MimeDel 2.1.5 Cc: "freebsd-questions@freebsd.org" , owner-freebsd-questions@freebsd.org Subject: Re: Survive from DDoS X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 May 2008 08:12:34 -0000 Hi, you may use ipf to drop packets from the attacking host I suppose. Or even limit the packets to the specified port. Regards, Ivailo Tanusheff Kalpin Erlangga Silaen Sent by: owner-freebsd-questions@freebsd.org 28.05.2008 05:01 To "freebsd-questions@freebsd.org" cc Subject Survive from DDoS Dear all, yesterday, our shell server was attack and server immeditiately reboot. I checked logs, it likes UDP flood with destination port 53. Is there any way how to survive from this kind attack? Also, is there any url/resources to improve our shell server? Thank you Kalpin Erlangga Silaen