Hello,

My sites are currently having a lot of problems with a hacker who is
constantly trying to bring down my web servers with SYN flood attacks.

I have enabled the SYN cookies mechanism and since doing so, he has not been
able to bring down my servers, but he chews up a ton of bandwidth.

I have a web server that is using Apache to host several sites on multiple
IP addresses. It's easy to distinguish a legitimate user from the hacker
because he cycles through my IP address range. He always attacks on port 80
and uses spoofed source addresses.

Is there anyway to set netfilter to block when there are a number half
opened connections (with a status of SYN_RECV) in the queue with the SAME
source address (spoofed or otherwise) waiting for and ACK (that never
arrives)?
I'd like to reject and reset any further connection attempts, at least for a
period of time.

Thanks,

Rob



Reply via email to