No it's not. we are talking about udp reflections from multiple thousands hosts...
Nothing would ever match your rules (TCP) Il 11/01/2013 22.54, Jake Forrester ha scritto: > I know this is a little late, but here's an iptables rule I use to help > against DDoS attacks. You'll probably need to have two--one for UDP and > one for TCP if it's a DNS type of attack. > > # allow only 8 req/sec per IP > -A INPUT -p tcp -m state --state NEW -m tcp --tcp-flags FIN,SYN,RST,ACK > SYN -m recent --set --name SYNFLOOD --rsource > -A INPUT -p tcp -m state --state NEW -m tcp --tcp-flags FIN,SYN,RST,ACK > SYN -m recent --update --seconds 1 --hitcount 8 --name SYNFLOOD > --rsource -j DROP > > Not sure if this is the type of solution you're looking for, but it > couldn't hurt. > > - rann > > On 1/11/2013 12:40 PM, John wrote: >> The solution that gamead...@127001.org gave was correct. For DNS DRDoS >> reflection attacks, the best plan is to have your upstream apply an >> ACL that whitelists the couple of DNS servers that you use and blocks >> all other traffic from port 53 to your network. Your ISP should be >> able to do this for little or no cost. Null-routing is not usually >> required for this type of attack unless your upstream's overall >> network capacity is less than 10G. >> >> DNS DRDoS attacks are one of the most common and easiest (thankfully) >> types to filter. Other DRDoS attacks can be a little harder to filter, >> and there are non-reflected attacks that are yet more difficult to >> block, requiring advanced string-matching rules upstream or other >> specialized techniques. >> >> -John >> >> On 1/11/2013 4:09 AM, ics wrote: >>> Most of us have experienced ddos attacks like that and yes >>> nullrouting is the only protection so the whole network isn't >>> affected. There is no protection against that without paying huge >>> sums of money. Those are not an option to small communities. >>> >>> -ics >>> >>> ----- Alkuperäinen viesti ----- >>>> We've had incoming DNS query reply attacks over several Gbit/sec. Any >>>> non-pro gaming community like ours can't defend against such floods of >>>> data. >>>> >>>> All you can do is have your IP's null-routed and wait till the attack >>>> dies out. >>>> >>>> Saint K. >>>> ________________________________________ >>>> From: hlds_linux-boun...@list.valvesoftware.com >>>> [hlds_linux-boun...@list.valvesoftware.com] On Behalf Of Sachin Sud >>>> [sudsac...@gmail.com] Sent: 11 January 2013 11:42 To: Half-Life >>>> dedicated Linux server mailing list Subject: Re: [hlds_linux] Servers >>>> get attacked via DDoS >>>> >>>> @127001 ( Some Pin code) .Orrgy >>>> Do i really care? >>>> Its better you start protecting your servers before its too late! >>>> Don't waste your time !:) >>>> >>>> On Fri, Jan 11, 2013 at 4:06 PM, <gamead...@127001.org> wrote: >>>> >>>>> Just because they're well known doesn't make them immune to >>>>> configuration cockups... one solution might be to get your host to >>>>> firewall all incoming from port 53 except for stuff coming from your >>>>> hosts' DNS servers (or google's, or whoever) - that won't help if the >>>>> bandwidth is going to overwhelm your host's core router, but it WILL >>>>> help in cases where it's flooding out your uplink >>>>> >>>>> @Sachin Sud: >>>>> >>>>> Perhaps you could actually be constructive? Despite saying you didn't >>>>> want to spam the list, your two contributions have been "lol" and a >>>>> post that essentially says "I think your approach is wrong but I'm not >>>>> going to give any details whatsoever" >>>>> >>>>>> -----Original Message----- >>>>>> From: hlds_linux-boun...@list.valvesoftware.com [mailto:hlds_linux- >>>>>> boun...@list.valvesoftware.com] On Behalf Of Marco Padovan >>>>>> Sent: 11 January 2013 10:32 >>>>>> To: hlds_linux@list.valvesoftware.com >>>>>> Subject: Re: [hlds_linux] Servers get attacked via DDoS >>>>>> >>>>>> yes, the attacks is exactly that... >>>>>> >>>>>> but those are not just "broken dns",i even saw some *well known* IT >>>>>> names into the "attackers". >>>>>> >>>>>> Il 11/01/2013 11.16, Arnim Eijkhoudt ha scritto: >>>>>>> Haha, >>>>>>> >>>>>>> I hope you're joking. Almost none of your questions are remotely >>>>>>> relevant to this type of attack. DNS reflection attacks can only be >>>>>>> effectively mitigated upstream. The structural solution, >>>>>>> unfortunately, is educating/informing the admins of the broken DNS >>>>>>> servers (short of just bluntly increasing the bandwidth capacity of >>>>>>> the affected server(s) and 'sitting it out'). >>>>>>> >>>>>>> See also: http://blog.cloudflare.com/65gbps-ddos-no-problem >>>>>>> >>>>>>> €0,02 >>>>>>> >>>>>>> On 11-1-2013 10:52, Sachin Sud wrote: >>>>>>>> My intensions are not to spam this mail list. >>>>>>>> But if you guys are comfortable , you need to answer few >>>>>>>> questions >>>>>> by >>>>>>>> which >>>>>>>> i can help you better to get saved from ddos attacks. >>>>>>>> >>>>>>>> Which country are you from? >>>>>>>> How many game servers you host? >>>>>>>> How often the attack happens? >>>>>>>> Is it specific to any particular game? >>>>>>>> Which OS you have on server? >>>>>>>> What kind of firewall you use , in case if you use any >>>>>>>> And last question How much money you spend monthly on servers ( >>>>>> Based on >>>>>>>> your location, i can recommend some ddos protection if required ) >>>>>>>> >>>>>>>> Thanks, >>>>>>>> Sachin >>>>>>> _______________________________________________ >>>>>>> To unsubscribe, edit your list preferences, or view the list >>>>>> archives, >>>>>>> please visit: >>>>>>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds_linux >>>>>> _______________________________________________ >>>>>> To unsubscribe, edit your list preferences, or view the list >>>>>> archives, please visit: >>>>>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds_linux >>>>> _______________________________________________ >>>>> To unsubscribe, edit your list preferences, or view the list archives, >>>>> please visit: >>>>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds_linux >>>>> >>>> _______________________________________________ >>>> To unsubscribe, edit your list preferences, or view the list archives, >>>> please visit: >>>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds_linux >>>> >>>> _______________________________________________ >>>> To unsubscribe, edit your list preferences, or view the list archives, >>>> please visit: >>>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds_linux >>> _______________________________________________ >>> To unsubscribe, edit your list preferences, or view the list >>> archives, please visit: >>> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds_linux >> >> _______________________________________________ >> To unsubscribe, edit your list preferences, or view the list archives, >> please visit: >> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds_linux > _______________________________________________ To unsubscribe, edit your list preferences, or view the list archives, please visit: https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds_linux