RE: Connection flood: how to protect?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello,

Thank you for reply. Unfortunately, mod-limitipconn seems to act too late.
After installing and enabling it:
<Location />
  MaxConnPerIP 15
</Location>

Netstat shows:
# netstat -atn
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address           Foreign Address         State
tcp        0      0 0.0.0.0:80              0.0.0.0:*               LISTEN
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):3930      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):3316      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):4147      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):3854      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):1500      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):3931      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):2325      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):1652      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):1499      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):1710      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):1125      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):1913      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):2445      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):3929      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):1119      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):4602      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):3518      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):1529      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):1551      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):1502      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):3122      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):1311      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):3529      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):3856      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):4714      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):1680      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):3286      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):1120      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):1651      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):3123      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):4329      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):2285      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):2488      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):1653      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):1296      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):4709      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):1530      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):3747      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):4438      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):4445      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):3907      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):3124      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):1597      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):2318      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):1497      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):2333      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):1179      SYN_RECV
tcp        0      0 (MY-SERVER-IP):80       (ATTACKER-IP):1707      SYN_RECV
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):4309      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):3897      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):3969      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):1292      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):4315      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):2121      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):1314      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):3082      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):1923      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):2719      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):4075      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):4323      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):3533      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):3579      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):4284      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):4112      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):3270      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):2469      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):2468      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):4588      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):1088      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):1897      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):3694      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):1900      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):3649      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):2047      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):1090      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):1315      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):1490      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):4310      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):1130      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):1130      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):4079      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):1093      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):4080      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):1094      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):1049      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):1908      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):4078      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):4705      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):3342      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):3087      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):2920      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):4340      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):3268      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):1091      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):3269      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):1898      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):3784      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):1097      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):2476      LAST_ACK
tcp        0      1 (MY-SERVER-IP):80       (ATTACKER-IP):1899      LAST_ACK

The server does not respond to HTTP anymore...




-----Ursprüngliche Nachricht-----
Von: Justin Pasher [mailto:justinp@xxxxxxxxxxxxxxxxxxx] 
Gesendet: Montag, 13. April 2009 22:47
An: users@xxxxxxxxxxxxxxxx
Cc: k.reznichak@xxxxxxxxx
Betreff: Re:  Connection flood: how to protect?

Kanstantin Reznichak wrote:
>
> Hello,
>
> One of my servers was affected by TCP flood attack targeted to http 
> service (Apache 2.2.8). Short attack description: an attacker opens 
> large amount of TCP connections to Apache service and sends few bytes 
> (for example, a single ?GET / HTTP/1.1? line) to every opened 
> connection. The HTTP service opens a new process for every such 
> connection and waits for further input. After a short time, HTTPd runs 
> out of connection limit and stops responding.
>
> Some of my servers are protected by state tracking firewall that 
> protects them against such kind of attack.
>
> My question: is there possible to configure Apache HTTPd in order to 
> protect it against these attacks?
>

Check out mod_limitipconn. You can restrict the number of simultaneous 
connections from individual IP addresses.

http://dominia.org/djao/limitipconn.html


-- 
Justin Pasher

---------------------------------------------------------------------
The official User-To-User support forum of the Apache HTTP Server Project.
See <URL:http://httpd.apache.org/userslist.html> for more info.
To unsubscribe, e-mail: users-unsubscribe@xxxxxxxxxxxxxxxx
   "   from the digest: users-digest-unsubscribe@xxxxxxxxxxxxxxxx
For additional commands, e-mail: users-help@xxxxxxxxxxxxxxxx


---------------------------------------------------------------------
The official User-To-User support forum of the Apache HTTP Server Project.
See <URL:http://httpd.apache.org/userslist.html> for more info.
To unsubscribe, e-mail: users-unsubscribe@xxxxxxxxxxxxxxxx
   "   from the digest: users-digest-unsubscribe@xxxxxxxxxxxxxxxx
For additional commands, e-mail: users-help@xxxxxxxxxxxxxxxx



[Index of Archives]     [Open SSH Users]     [Linux ACPI]     [Linux Kernel]     [Linux Laptop]     [Kernel Newbies]     [Security]     [Netfilter]     [Bugtraq]     [Squid]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Samba]     [Video 4 Linux]     [Device Mapper]

  Powered by Linux