Date: Thu, 7 Oct 2004 11:30:27 -0400 From: "Bigelow, Andrea L." <BigelowA@SEC.GOV> To: "'questions@freebsd.org'" <questions@freebsd.org> Subject: RE: Reduce effects of DDoS attack ... Message-ID: <DAFBDAFECE8ABA48A14ACFAE3707F41A020054AD@opc-sec-exch1>
next in thread | raw e-mail | index | archive | help
Marc, usually the best answer to this is to have your net-facing device be a router (not a switch!) with enough juice to run a comprehensive ACL that keeps out martians, spoofed packets, and other stuff that doesn't belong on your network. Your second line of defense should be a good firewall, sitting behind the router. If your server cluster is supposed to be on the DMZ, then set up the switch behind the router with the boxes and the firewall on that switch. I realize that this is a VERY simplistic design description, and it could be tightened up, locked down, and fancified quite a lot, but it's the very basics. -----Original Message----- From: Marc G. Fournier [mailto:scrappy@hub.org] Sent: Thursday, October 07, 2004 11:19 AM To: freebsd-net@freebsd.org Cc: freebsd-isp@freebsd.org; freebsd-questions@freebsd.org Subject: Reduce effects of DDoS attack ... I've got 5 servers sitting on a 10/100 unmanaged switch right now ... last night, a DDoS attack against a network "beside us" cause 70+% packet loss on our network, and I'm trying to figure out if there is anything I can do from my side to "compensate" for this ... I run ipaudit on all our servers, and a normal 30 minute period looks like: neptune# gzcat 2004-10-06-22:00.txt.gz | grep 200.046.204 | wc -l 12107 neptune# gzcat 2004-10-06-22:00.txt.gz | grep -v 200.046.204 | wc -l 112 neptune# gzcat 2004-10-06-22:00.txt.gz | wc -l 12219 where 200.046.204 is our C-class ... Now, when the DDoS attack is running, those stats change to: neptune# gzcat 2004-10-06-17:30.txt.gz | grep 200.046.204 | wc -l 5815 neptune# gzcat 2004-10-06-17:30.txt.gz | grep -v 200.046.204 | wc -l 594189 neptune# gzcat 2004-10-06-17:30.txt.gz | wc -l 600004 We're getting *alot* of traffic on our network that just is not ours ... Now, I can login to the servers, and load is negligible ... but packet loss is anywhere from 50->90%, so pretty much unusable ... Now, the shared 'switch' between our networks is a Cisco Catalyst 2900xl ... is there something that should be set on that so that I don't see that network traffic? Basically, the only network traffic that I should/want to see is that for my network .. in this case, 200.46.204? Baring that ... is there anything that I can do on the FreeBSD side of things to reduce the impact of the "extra packets"? Some way of "absorbing them"? For instance, if the packet is coming in, and it isn't for that server, then I imagine it has to 'bounce' it back out again, compounding the problem, no? Also ... since the FreeBSD servers do seem to be handling the load, is it possible that the unmanaged switch that i have in place between the FreeBSD box and the Cisco switch is 'buckling under the load'? Not able to handle the packets fast enough, and therefore just drop'ng them? The unmanage switch is a 10/100 Linksys Switch ... Thanks for any responses ... ---- Marc G. Fournier Hub.Org Networking Services (http://www.hub.org) Email: scrappy@hub.org Yahoo!: yscrappy ICQ: 7615664 _______________________________________________ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to "freebsd-questions-unsubscribe@freebsd.org"
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?DAFBDAFECE8ABA48A14ACFAE3707F41A020054AD>