Date: Sat, 29 Sep 2001 01:39:25 +0200 From: "Karsten W. Rohrbach" <karsten@rohrbach.de> To: Mike Tancsa <mike@sentex.net> Cc: Ronan Lucio <ronan@melim.com.br>, freebsd-security@FreeBSD.ORG Subject: Re: flood attacks Message-ID: <20010929013925.C37579@mail.webmonster.de> In-Reply-To: <5.1.0.14.0.20010927125302.048abb10@marble.sentex.ca>; from mike@sentex.net on Thu, Sep 27, 2001 at 12:57:48PM -0400 References: <Pine.BSF.4.33.0109270907350.1695-100000@R181172.resnet.ucsb.edu> <037601c14773$52a23da0$2aa8a8c0@melim.com.br> <5.1.0.14.0.20010927125302.048abb10@marble.sentex.ca>
next in thread | previous in thread | raw e-mail | index | archive | help
[-- Attachment #1 --] just as a sidenote: some people from the net.community, prelude nids projects and me are currently thinking about implementing a real network intrusion management system which means that in the future we hopefully will be able to do active countermeasure stuff concerning dos/ddos and other network attacks. there is no single line of code written yet, it's brainstorm and discussion time at the moment. if you want to join the discussion check the archive of the list [http://defender.webmonster.de/lists.html] and subscribe ;-) cheers, /k Mike Tancsa(mike@sentex.net)@2001.09.27 12:57:48 +0000: > > The problem is that once its in your network, its too late so to speak. You > want to involve your ISP to get them to limit it before it traverses your > link. If you are lucky the packets are not random junk and you can block > on the source IP. Are they hitting the same port ? are they coming from > random IPs ? As someone said, > sysctl -w net.inet.tcp.log_in_vain=1 > sysctl -w net.inet.ud.log_in_vain=1 > > If they are not hitting random ports and hitting say your web server, > ipfw add 10 count log tcp from any to me 80;sleep 10;ipfw delete 10 > and look at /var/log/security and see where the junk is coming from. > > ---Mike > > At 01:41 PM 9/27/01 -0300, Ronan Lucio wrote: > >Hi Dave, > > > >But, in my case, I looked at mrtg graphics and saw that > >it had big flow during 1 hour. > >So, I supposed to prevent such situation. > > > >[ ]īs > > > >Ronan Lucio > > > > > > Limiting closed port RST response from 1800 to 200 packets per > >second. > > > > > > Awhile back, I managed to reproduce this by portscanning myself with a > > > very fast scanner which doesn't wait for any kind of response from the > > > server before testing the next port. The 1800 to 200 message thing sounds > > > quite general, so you could be getting flooded with lots of different > > > kinds of data. If the messages come in briefly and then stop for awhile > > > (rather than a continus flow) you could just be getting a fast port scan. > > > > > > > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > > > with "unsubscribe freebsd-security" in the body of the message > > > > > > > > > > > >To Unsubscribe: send mail to majordomo@FreeBSD.org > >with "unsubscribe freebsd-security" in the body of the message > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-security" in the body of the message -- > Nuclear war can ruin your whole compile. --Karl Lehenbauer KR433/KR11-RIPE -- WebMonster Community Founder -- nGENn GmbH Senior Techie http://www.webmonster.de/ -- ftp://ftp.webmonster.de/ -- http://www.ngenn.net/ karsten&rohrbach.de -- alpha&ngenn.net -- alpha&scene.org -- catch@spam.de GnuPG 0x2964BF46 2001-03-15 42F9 9FFF 50D4 2F38 DBEE DF22 3340 4F4E 2964 BF46 Please do not remove my address from To: and Cc: fields in mailing lists. 10x [-- Attachment #2 --] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iD8DBQE7tQotM0BPTilkv0YRAgY8AJ0b41pdhJxY7LdGn6eNIkZOM/0pTACgl3VX ShrRcYWZYU34mVVZ0HcxoP0= =N/3P -----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010929013925.C37579>
