Date: Thu, 14 Sep 2006 13:06:34 -0700 From: Chris <eagletree@hughes.net> To: freeBSD <freebsd-questions@freebsd.org> Subject: Re: Under Attack: Bandwidth throttling on 5.2.1? Message-ID: <A4AC2694-96D2-48DE-AE76-D1EE0319FC53@hughes.net> In-Reply-To: <4509B33B.80604@ee.duth.gr> References: <C214FC9E-0D29-44F0-B8F5-2116135A4AF1@cbpratt.prohosting.com> <4509B33B.80604@ee.duth.gr>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sep 14, 2006, at 12:53 PM, Panagiotis wrote: > Chris wrote: > >> ...system, we could come back up I think and try ride out the >> attack. I've never done this before but in an earlier thread I >> saw where you configure a pipe such as: >> >> ipfw pipe 1 config bw 256Kbit/s >> ipfw add pipe 1 tcp from 192.168.1.2 80 >> >> then set sysctl.conf >> net.inet.ip.fw.one_pass=1 >> >> Is that is all that's necessary for this old a system or is there >> anything else. If this is correct, would this keep this fellow >> from crashing > > To use traffic shaping with IPFW you have to compile the kernel > with the following options: > > options DUMMYNET > options HZ=1000 > > then you can add some lines like these to make your bandwidth limit > to work: > > #first flush all the previous pipes > ipfw -q -f pipe flush > > ipfw pipe 1 config bw 256Kbit/s > ipfw add pipe 1 tcp from any to any > > usually we use two pipes, one for download and one for upload so > you can try something like this: > > > #first flush all the previous pipes > ipfw -q -f pipe flush > > #upload bandwidth+download bandwidth=total bandwidth > #pipe for upload > ipfw pipe 1 config bw 128Kbit/s > #pipe for download > ipfw pipe 2 config bw 256Kbit/s > > server_port="20,21,80,443,995,...,etc" > internal_network="192.168.0.0" > > #config upload > ipfw add pipe 1 tcp from $internal_network to any $server_port > #config upload > ipfw add pipe 2 tcp from any $server_port to $internal_network > > The variables "server_port" and "internal_network" are examples of > course... :-) > If you are running natd on your machine the you have to put rules > AFTER the divert natd rule like these: > ipfw add pipe 1 tcp from {external_ip} to any $server_port > ipfw add pipe 2 tcp from any $server_port to $internal_network > > The net.inet.ip.fw.one_pass=1 must be set if you want your traffic > to pass from pipes and not continue at next rules.... > > Sorry for my bad english.... > > > > > _______________________________________________ > freebsd-questions@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-questions > To unsubscribe, send any mail to "freebsd-questions- > unsubscribe@freebsd.org" Thank you very much. Even rejecting the requests by referer has only lessened the impact on the system and we are occasionally rebooting. It has not let up all night. I will implement. Thank you again. Chris
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?A4AC2694-96D2-48DE-AE76-D1EE0319FC53>