From owner-freebsd-questions@FreeBSD.ORG Wed May 28 08:32:17 2008 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 061AA106564A; Wed, 28 May 2008 08:32:17 +0000 (UTC) (envelope-from kalpin@muliahost.com) Received: from smtp.velo.net.id (smtp2-out.velo.net.id [203.153.99.105]) by mx1.freebsd.org (Postfix) with ESMTP id 9A9B18FC22; Wed, 28 May 2008 08:32:16 +0000 (UTC) (envelope-from kalpin@muliahost.com) Received: from localhost (batubulan.net2cyber.net [127.0.0.1]) by smtp.velo.net.id (Postfix) with ESMTP id 29DB58101AE; Wed, 28 May 2008 15:32:15 +0700 (WIT) X-Virus-Scanned: amavisd-new at velo.net.id Received: from smtp.velo.net.id ([127.0.0.1]) by localhost (seminyak.velo.net.id [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2fdix5IJmuci; Wed, 28 May 2008 15:32:14 +0700 (WIT) Received: from [203.153.106.5] (ip-5-106-net.express.net.id [203.153.106.5]) by smtp.velo.net.id (Postfix) with ESMTP id EFDF48101D0; Wed, 28 May 2008 15:32:13 +0700 (WIT) Message-ID: <483D188C.3050007@muliahost.com> Date: Wed, 28 May 2008 15:32:12 +0700 From: Kalpin Erlangga Silaen User-Agent: Thunderbird 2.0.0.14 (Windows/20080421) MIME-Version: 1.0 To: Ivailo Tanusheff References: In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: "freebsd-questions@freebsd.org" , owner-freebsd-questions@freebsd.org Subject: Re: Survive from DDoS X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 28 May 2008 08:32:17 -0000 Dear Ivailo, thank you for your response. I am using ipfw to limit all packets for all open port in my server. But the packet size was 600 Mbps which could not filtered by our ISP. Ivailo Tanusheff wrote: > Hi, > > you may use ipf to drop packets from the attacking host I suppose. Or even > limit the packets to the specified port. > > Regards, > > Ivailo Tanusheff > > > > > Kalpin Erlangga Silaen > Sent by: owner-freebsd-questions@freebsd.org > 28.05.2008 05:01 > > To > "freebsd-questions@freebsd.org" > cc > > Subject > Survive from DDoS > > > > > > > Dear all, > > yesterday, our shell server was attack and server immeditiately reboot. > I checked logs, it likes UDP flood with destination port 53. Is there > any way how to survive from this kind attack? Also, is there any > url/resources to improve our shell server? > > Thank you > > > Kalpin Erlangga Silaen > > > _______________________________________________ > freebsd-questions@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-questions > To unsubscribe, send any mail to "freebsd-questions-unsubscribe@freebsd.org" >