At 08:56 AM 5/29/03 +0700, ius wrote:
>
>> yup hal itu pernah saya alami, apa ada yang efektif untuk mngurangi atau
>> menangkal serangan tersebut
>
>Refuse responding to broadcasts request
>
>As for the ping request, it's also important to disable broadcast
>requests. When a packet is
>sent to an IP broadcast address (i.e. 192.168.1.255) from a machine on the
>local network, that packet is delivered to all machines on that network.
>Then all the machines on a network respond to this ICMP echo request and
>the result can be severe network congestion or outages DOS
>(Denial-of-Service attacks). See the RFC 2644 for more information.
>
>Step 1
>
>Edit the sysctl.conf file (vi /etc/sysctl.conf) and add the following line:
>
># Enable ignoring broadcasts request
>net.ipv4.icmp_echo_ignore_broadcasts = 1
>
>Step 2
>
>Once the configuration has been set, you must restart your network for the
>change to take effect.
>The command to restart the network is the following:
>To restart all networks devices manually on your system, use the following
>command:
>
>[EMAIL PROTECTED] /]# /etc/rc.d/init.d/network restart
>

Itu merupakan salah satu cara agar network kita tidak merespons broadcast
request 
tapi tidak menghentikan flood attack dari luar. Dengan kata lain: selain 
mengontrol network kita (e.g. paket mana yang boleh masuk, paket yang mana 
yang mesti direspons dan bagaiman cara meresponsnya) kita
juga mesti membuat flood/attack berhenti terkirim (karena kalau tidak,
seperti 
yang dikatakan Bung Yulian F., flood bisa-bisa masih mendominasi pipa
bandwidth 
yang masuk ke server/network kita). Dan itu di luar (kendali) network kita. 

Jalurnya saya rasa  memberitahukan ISP kita agar paket flood/attack 
ke network kita distop dan  selanjutnya ISP akan memberitahukan 
atau trace ke upstream-nya. 

Salam,
Rudy




---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Kirim email ke