I'm trying to deal with the following problem:

  * My BIND 9.9.1-P1 DNS server is being hammered with a
    reflection/amplification DDoS attack where a small
    (67 bytes) query is causing a large (2577 bytes)
    answer to be sent to the query's forged source address.

  * I've applied the rate-limit patch from here:

      http://www.redbarn.org/dns/ratelimits

    and it works well until the query load get to be about
    11,000/second and then general packet loss starts to occur.

  * After identifying the egregious source addresses with dnstop(1),
    the Shorewall blacklist feature helps very much.  While I only
    need to block ten or fewer addresses at a time, this solution
    does not scale because the spoofed addresses are always changing.

I ran across the following article:
http://forum.slicehost.com/index.php?p=/discussion/2970/dns-multiplication-ddos-underway/p1

and in my particular case, it would be ideal if I could insert the following
rule into my Shorewall configuration:

  iptables -t raw -I PREROUTING -p udp --destination-port 53 -m string \
  --algo kmp --from <offset> --hex-string "|<some hex data>|" -j DROP

I'm using Debian stable and so the version of Shorewall is 4.4.11
and have read the following documentation:

  http://www.shorewall.net/Actions.html#Extension
  http://www.shorewall.net/shorewall_extension_scripts.htm
  http://www.shorewall.net/ManualChains.html

So my question is:

  It seems possible to add custom iptables rules in Shorewall but
  I would like to add a rule before connection tracking takes place,
  i.e., the rule should go in the PREROUTING chain of the "raw" table.
  Can this be done within the Shorewall framework?

If so, then could someone indulge me with the high-level steps that
are needed to achieve this?

Thanks,
Andris


------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to