If you are fortunate enough to have a firewall running Netfilter
(iptables) - you should be able to limit the number of requests per
minute. It's a built in feature to avoid these sorts of retarded DOSes.
Better yet, if you have a wicked sense of humor and a little free time,
plant a few tarpits and enjoy making the offending machines' lives a
little more agonizing. =)

Netfilter Intro:  http://www.knowplace.org/netfilter/  (view info about
the --limit-burst and --limit options)
Tarpits Info:  http://www.hackbusters.net/LaBrea/

jb


leon wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> If you are worried about being overloaded by this traffic, (or any
> undesirable traffic for that matter), why not just throw them in your
> edge router's acls?  After that why not contact the owners of ip
> after you do a whois on them?
>
> HTH,
>
> Leon
>
> - -----Original Message-----
> From: Seth Keller [mailto:[EMAIL PROTECTED]]
> Sent: Wednesday, November 21, 2001 2:51 PM
> To: [EMAIL PROTECTED]
> Subject: Has anyone seen this before?
>
> We have been absolutely bombarbed for the last 3 hours from a range
> of IP's which appear to be performing legitimate requests to port 80
> on our web server.  Our T1 line has seen 100% utilization for the
> last 3 hours.  We are getting roughly 500-600 requests per minute
> from a specific range of IP's.  The IP addresses revolve around in
> near perfect order.  They start at 216.106.166.141 and roll up to
> 216.106.166.207 before repeating.  Any ideas?  Thanks in advance.
>
> Seth Keller
> Culver Community Schools
>
> -----BEGIN PGP SIGNATURE-----
> Version: PGPfreeware 6.5.8 for non-commercial use <http://www.pgp.com>
>
> iQA/AwUBO/6qA9qAgf0xoaEuEQL8EACbBtJKS9zIfQWqbX7ETqbQCgSNOTwAoMZl
> ntlvP2/Mgr9tCf/7fRb/KTLE
> =saY4
> -----END PGP SIGNATURE-----

Reply via email to