Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 28 May 2008 15:32:12 +0700
From:      Kalpin Erlangga Silaen <kalpin@muliahost.com>
To:        Ivailo Tanusheff <i.tanusheff@procreditbank.bg>
Cc:        "freebsd-questions@freebsd.org" <freebsd-questions@freebsd.org>, owner-freebsd-questions@freebsd.org
Subject:   Re: Survive from DDoS
Message-ID:  <483D188C.3050007@muliahost.com>
In-Reply-To: <OFD57C446B.F6D09014-ONC2257457.002CF6F5-C2257457.002D1430@procreditbank.bg>
References:  <OFD57C446B.F6D09014-ONC2257457.002CF6F5-C2257457.002D1430@procreditbank.bg>

next in thread | previous in thread | raw e-mail | index | archive | help
Dear Ivailo,

thank you for your response. I am using ipfw to limit all packets for 
all open port in my server. But the packet size was 600 Mbps which could 
not filtered by our ISP.

Ivailo Tanusheff wrote:
> Hi,
>
> you may use ipf to drop packets from the attacking host I suppose. Or even 
> limit the packets to the specified port.
>
> Regards,
>
> Ivailo Tanusheff
>
>
>
>
> Kalpin Erlangga Silaen <kalpin@muliahost.com> 
> Sent by: owner-freebsd-questions@freebsd.org
> 28.05.2008 05:01
>
> To
> "freebsd-questions@freebsd.org" <freebsd-questions@freebsd.org>
> cc
>
> Subject
> Survive from DDoS
>
>
>
>
>
>
> Dear all,
>
> yesterday, our shell server was attack and server immeditiately reboot.
> I checked logs, it likes UDP flood with destination port 53. Is there
> any way how to survive from this kind attack? Also, is there any
> url/resources to improve our shell server?
>
> Thank you
>
>
> Kalpin Erlangga Silaen
>
>
> _______________________________________________
> freebsd-questions@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to "freebsd-questions-unsubscribe@freebsd.org"
>   




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?483D188C.3050007>