These packets don't really use up processing power, but they just take over your link... Adding a rule to iptables that would drop the connections wouldn't help. Sorry.
Sergiusz Bazański xmpp: [email protected] www: http://q3k.org/ On Mon, Oct 17, 2011 at 10:30 PM, ics <[email protected]> wrote: > Looks much like some-prog-that-i-wont-say-out-loud-from-4chan-sute output, > with just modified message. Looks like idiots have found it and started > using it. > > -ics > > 17.10.2011 23:09, Marco Padovan kirjoitti: >> >> Additionally: set a very strict rate limiting to new connections (10new >> connections every 20seconds?) and drop anything that's not >> "estabilished"... >> >> Il 17/10/2011 21:15, ?????? ?????? [Nikita Bulaev] ha scritto: >>> >>> Hi, firends! >>> >>> Some our clients are under stupid attack by tcp packets with length 1480 >>> bytes. >>> >>> ============= >>> 22:25:17.613625 IP (tos 0x0, ttl 124, id 5073, offset 0, flags [DF], >>> proto >>> TCP (6), length 1480) >>> 188.186.18.151.50325> 188.64.170.100.27019: Flags [P.], cksum 0x3c63 >>> (correct), seq 39288:40728, ack 1, win 64800, length 1440 >>> >>> 0x0000: 0025 901a fd64 0026 9806 ddc1 0800 4500 >>> .%...d.&......E. >>> 0x0010: 05c8 13d1 4000 7c06 af68 bcba 1297 bc40 >>> ....@.|..h.....@ >>> 0x0020: aa64 c495 698b c6b8 4281 3531 d72b 5018 >>> .d..i...B.51.+P. >>> 0x0030: fd20 3c63 0000 6e65 2074 6f6f 2e20 4465 >>> ..<c..ne.too..De >>> 0x0040: 7375 6465 7375 6465 7375 7e41 2063 6174 >>> sudesudesu~A.cat >>> 0x0050: 2069 7320 6669 6e65 2074 6f6f 2e20 4465 >>> .is.fine.too..De >>> 0x0060: 7375 6465 7375 6465 7375 7e41 2063 6174 >>> sudesudesu~A.cat >>> 0x0070: 2069 7320 6669 6e65 2074 6f6f 2e20 4465 >>> .is.fine.too..De >>> 0x0080: 7375 6465 7375 6465 7375 7e41 2063 6174 >>> sudesudesu~A.cat >>> 0x0090: 2069 7320 6669 6e65 2074 6f6f 2e20 4465 >>> .is.fine.too..De >>> 0x00a0: 7375 6465 7375 6465 7375 7e41 2063 6174 >>> sudesudesu~A.cat >>> 0x00b0: 2069 7320 6669 6e65 2074 6f6f 2e20 4465 >>> .is.fine.too..De >>> 0x00c0: 7375 6465 7375 6465 7375 7e41 2063 6174 >>> sudesudesu~A.cat >>> 0x00d0: 2069 7320 6669 6e65 2074 6f6f 2e20 4465 >>> .is.fine.too..De >>> 0x00e0: 7375 6465 7375 6465 7375 7e41 2063 6174 >>> sudesudesu~A.cat >>> ================= >>> >>> And so on... >>> >>> The tcpdump can be found here: >>> http://188.64.170.86/bulkin/files/dos_vsplay.zip >>> >>> So is there a way to prevent it by Iptables? >>> >>> Nikita Bulaev >>> _______________________________________________ >>> To unsubscribe, edit your list preferences, or view the list archives, >>> please visit: >>> http://list.valvesoftware.com/mailman/listinfo/hlds_linux >> >> _______________________________________________ >> To unsubscribe, edit your list preferences, or view the list archives, >> please visit: >> http://list.valvesoftware.com/mailman/listinfo/hlds_linux > > > _______________________________________________ > To unsubscribe, edit your list preferences, or view the list archives, > please visit: > http://list.valvesoftware.com/mailman/listinfo/hlds_linux > > _______________________________________________ To unsubscribe, edit your list preferences, or view the list archives, please visit: http://list.valvesoftware.com/mailman/listinfo/hlds_linux

