Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 28 May 2008 17:22:38 +0300
From:      Ivailo Tanusheff <i.tanusheff@procreditbank.bg>
To:        Kalpin Erlangga Silaen <kalpin@muliahost.com>
Cc:        "freebsd-questions@freebsd.org" <freebsd-questions@freebsd.org>, owner-freebsd-questions@freebsd.org
Subject:   Re: Survive from DDoS
Message-ID:  <OFE4300FDA.326770E2-ONC2257457.004EB163-C2257457.004EF9EC@procreditbank.bg>
In-Reply-To: <483D188C.3050007@muliahost.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Hi,

What I wanted to say was to use pf, not ipf. You may use something like 
this:

table <sshspammer> persist
block log quick from <sshspammer>

# sshspammer
# more than 6 ssh attempts in 15 seconds will be blocked ;)
pass in quick on $ext_if proto tcp to ($ext_if) port ssh keep state 
(max-src-conn 10, max-src-conn-rate 6/15, overload <sshspammer> flush 
global)

which I use for ssh flood protection or brute force attacks. You have to 
change the syntax to use it for DNS.
Hope this will help you.

Regards,

Ivailo Tanusheff




Kalpin Erlangga Silaen <kalpin@muliahost.com> 
Sent by: owner-freebsd-questions@freebsd.org
28.05.2008 11:34

To
Ivailo Tanusheff <i.tanusheff@procreditbank.bg>
cc
"freebsd-questions@freebsd.org" <freebsd-questions@freebsd.org>, 
owner-freebsd-questions@freebsd.org
Subject
Re: Survive from DDoS






Dear Ivailo,

thank you for your response. I am using ipfw to limit all packets for 
all open port in my server. But the packet size was 600 Mbps which could 
not filtered by our ISP.

Ivailo Tanusheff wrote:
> Hi,
>
> you may use ipf to drop packets from the attacking host I suppose. Or 
even 
> limit the packets to the specified port.
>
> Regards,
>
> Ivailo Tanusheff
>
>
>
>
> Kalpin Erlangga Silaen <kalpin@muliahost.com> 
> Sent by: owner-freebsd-questions@freebsd.org
> 28.05.2008 05:01
>
> To
> "freebsd-questions@freebsd.org" <freebsd-questions@freebsd.org>
> cc
>
> Subject
> Survive from DDoS
>
>
>
>
>
>
> Dear all,
>
> yesterday, our shell server was attack and server immeditiately reboot.
> I checked logs, it likes UDP flood with destination port 53. Is there
> any way how to survive from this kind attack? Also, is there any
> url/resources to improve our shell server?
>
> Thank you
>
>
> Kalpin Erlangga Silaen
>
>
> _______________________________________________
> freebsd-questions@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to 
"freebsd-questions-unsubscribe@freebsd.org"
> 

_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to 
"freebsd-questions-unsubscribe@freebsd.org"




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?OFE4300FDA.326770E2-ONC2257457.004EB163-C2257457.004EF9EC>