Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 12 Feb 2013 18:46:26 +0100
From:      Fleuriot Damien <ml@my.gd>
To:        khatfield@socllc.net
Cc:        Norbert Aschendorff <norbert.aschendorff@yahoo.de>, "freebsd-isp@freebsd.org" <freebsd-isp@freebsd.org>
Subject:   Re: FreeBSD DDoS protection
Message-ID:  <79C9AC81-7937-4C2D-8514-51CAEAF314E7@my.gd>
In-Reply-To: <875329286.93002.1360690465766@d94655abdbc041fe9f54c404b6b4e89c.nuevasync.com>
References:  <SNT002-W152BF18F12BD59F112A1CBAE5040@phx.gbl> <321927899.767139.1360461430134@89b1b4b66ec741cb85480c78b68b8dce.nuevasync.com> <51179708.2030206@epipe.com> <op.wsehxssd34t2sn@tech304.office.supranet.net> <511A733E.3000208@yahoo.de> <875329286.93002.1360690465766@d94655abdbc041fe9f54c404b6b4e89c.nuevasync.com>

next in thread | previous in thread | raw e-mail | index | archive | help

On Feb 12, 2013, at 6:34 PM, khatfield@socllc.net wrote:

> As my response stated filter ICMP except where necessary. I can state =
coming from a mitigation background that there are ways to safely do it =
without causing any issues. However, yes, you can still filter ICMP and =
remain compliant with an example pf rule like:
> icmp_types =3D "{ echoreq, unreach }"
>=20

breaks traceroute :(



> But in real life situations under constant attacks, blocking ICMP can =
be a large part of keeping businesses online.
>=20

YMMV but I'd advise rate limiting instead of plain blocking.




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?79C9AC81-7937-4C2D-8514-51CAEAF314E7>