Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 23 Sep 2001 21:01:16 -0400
From:      Mike Tancsa <mike@sentex.net>
To:        Chris BeHanna <behanna@zbzoom.net>
Cc:        security@FreeBSD.ORG
Subject:   Re: New worm protection
Message-ID:  <5.1.0.14.0.20010923205904.03bb7bb8@192.168.0.12>
In-Reply-To: <20010923205118.Y52704-100000@topperwein.dyndns.org>
References:  <200109230836.f8N8akx29012@faith.cs.utah.edu>

next in thread | previous in thread | raw e-mail | index | archive | help
At 08:57 PM 9/23/2001 -0400, Chris BeHanna wrote:
>     The trouble with triggering ipfw/ipchain rules is that as the
>ruleset gets large, network performance gets slow (rulesets are
>searched linearly).  A nice compromisse would be to gather statistics
>on the attackers and just firewall out the top 10 or 20 or so.


Another option is to null route the IP address-- e.g. add a /32 route to 
ds0. One problem with this and blocking in general is that in some cases, 
the infected machines are from dynamic IP addresses.  You would be 
punishing innocent users.

         ---Mike
--------------------------------------------------------------------
Mike Tancsa,                          	          tel +1 519 651 3400
Sentex Communications,     			  mike@sentex.net
Providing Internet since 1994                    www.sentex.net
Cambridge, Ontario Canada			  www.sentex.net/mike


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5.1.0.14.0.20010923205904.03bb7bb8>