On Thu, Sep 20, 2018 at 08:52:20AM +1000, Richard wrote:
> My child was playing fortnite last night when another kid in the lobby
> threatened to DDOS him,

It doesn't appear to be "distributed", right ?

> SRC= 98.139.130.248
> SRC= 98.139.130.248
> SRC= 98.139.130.248
> SRC= 98.139.130.248

> Is there a mechanism in shorewall to prevent this particular attack ?
> 
> My first thought was rate limiting, but perhaps there are other security
> measures available ?

The packets were dropped, right ?  So there's nothing to limit, unless you can
cause the packets to be dropped further upstream (router/ISP).

But note this:
http://shorewall.org/manpages/shorewall-tcinterfaces.html
|IN-BANDWIDTH (in_bandwidth) - 
{-|bandwidth[:burst]|~bandwidth[:interval:decay_interval]}
|
|    The incoming bandwidth of that interface. Please note that you are not 
able to do traffic shaping on incoming traffic, as the traffic is already 
received before you could do so. But this allows you to define the maximum 
traffic allowed for this interface in total, if the rate is exceeded, the 
packets are dropped. You want this mainly if you have a DSL or Cable connection 
to avoid queuing at your providers side.
|
|    If you don't want any traffic to be dropped, set this to a value to zero 
in which case Shorewall will not create an ingress qdisc.Must be set to zero if 
the REDIRECTED INTERFACES column is non-empty.

which I take to mean that if you have an interface for which the "total
bandwidth" (in+out) is capped by the ISP, you can define that to avoid keeping
an increasing queue of stale, outgoing packets, which are useless and harmfully
keeping more recently sent packets from being transmitted.

Justin


_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to