Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 12 Feb 2013 11:34:21 -0600
From:      khatfield@socllc.net
To:        Norbert Aschendorff <norbert.aschendorff@yahoo.de>
Cc:        "freebsd-isp@freebsd.org" <freebsd-isp@freebsd.org>
Subject:   Re: FreeBSD DDoS protection
Message-ID:  <875329286.93002.1360690465766@d94655abdbc041fe9f54c404b6b4e89c.nuevasync.com>
In-Reply-To: <511A733E.3000208@yahoo.de>
References:  <SNT002-W152BF18F12BD59F112A1CBAE5040@phx.gbl> <321927899.767139.1360461430134@89b1b4b66ec741cb85480c78b68b8dce.nuevasync.com> <51179708.2030206@epipe.com> <op.wsehxssd34t2sn@tech304.office.supranet.net> <511A733E.3000208@yahoo.de>

next in thread | previous in thread | raw e-mail | index | archive | help
As my response stated filter ICMP except where necessary. I can state coming=
 from a mitigation background that there are ways to safely do it without ca=
using any issues. However, yes, you can still filter ICMP and remain complia=
nt with an example pf rule like:
icmp_types =3D "{ echoreq, unreach }"

But in real life situations under constant attacks, blocking ICMP can be a l=
arge part of keeping businesses online.

If everything was standard and attackers followed the packet/traffic specifi=
cations then going by the standard would be no problem. That's not the case a=
nd sometimes guidelines have to be situational.



-Kevin






On Feb 12, 2013, at 10:54 AM, "Norbert Aschendorff" <norbert.aschendorff@yah=
oo.de> wrote:

> In fact, it's specified in RFC1122:
>=20
>=20
>         3.2.2.6  Echo Request/Reply: RFC-792
>=20
>         Every host MUST implement an ICMP Echo server function that
>         receives Echo Requests and sends corresponding Echo Replies.
>=20
> I think it implies that the implementation should actually work. :)
>=20
> --Norbert
> _______________________________________________
> freebsd-isp@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-isp
> To unsubscribe, send any mail to "freebsd-isp-unsubscribe@freebsd.org"



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?875329286.93002.1360690465766>