Date: Wed, 28 May 2008 15:32:12 +0700 From: Kalpin Erlangga Silaen <kalpin@muliahost.com> To: Ivailo Tanusheff <i.tanusheff@procreditbank.bg> Cc: "freebsd-questions@freebsd.org" <freebsd-questions@freebsd.org>, owner-freebsd-questions@freebsd.org Subject: Re: Survive from DDoS Message-ID: <483D188C.3050007@muliahost.com> In-Reply-To: <OFD57C446B.F6D09014-ONC2257457.002CF6F5-C2257457.002D1430@procreditbank.bg> References: <OFD57C446B.F6D09014-ONC2257457.002CF6F5-C2257457.002D1430@procreditbank.bg>
next in thread | previous in thread | raw e-mail | index | archive | help
Dear Ivailo, thank you for your response. I am using ipfw to limit all packets for all open port in my server. But the packet size was 600 Mbps which could not filtered by our ISP. Ivailo Tanusheff wrote: > Hi, > > you may use ipf to drop packets from the attacking host I suppose. Or even > limit the packets to the specified port. > > Regards, > > Ivailo Tanusheff > > > > > Kalpin Erlangga Silaen <kalpin@muliahost.com> > Sent by: owner-freebsd-questions@freebsd.org > 28.05.2008 05:01 > > To > "freebsd-questions@freebsd.org" <freebsd-questions@freebsd.org> > cc > > Subject > Survive from DDoS > > > > > > > Dear all, > > yesterday, our shell server was attack and server immeditiately reboot. > I checked logs, it likes UDP flood with destination port 53. Is there > any way how to survive from this kind attack? Also, is there any > url/resources to improve our shell server? > > Thank you > > > Kalpin Erlangga Silaen > > > _______________________________________________ > freebsd-questions@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-questions > To unsubscribe, send any mail to "freebsd-questions-unsubscribe@freebsd.org" >
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?483D188C.3050007>