Re: IPTables DDoS

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On Mon, Jul 19, 2010 at 1:07 PM, Nilesh Govindarajan <lists@xxxxxxxxxx> wrote:
> On Mon, Jul 19, 2010 at 11:14 PM, Heiko Baums <lists@xxxxxxxxxxxxxxx> wrote:
>> Am Mon, 19 Jul 2010 22:43:45 +0530
>> schrieb Nilesh Govindarajan <lists@xxxxxxxxxx>:
>>
>>> Hi,
>>> Can someone tell me how to use IPTables to prevent DDoS attacks?
>>> I'm sure IPTables has the relevant modules (limit, recent I think)
>>> after reading some docs, but still in doubt about its implementation.
>>
>> There's the --limit option against DoS attacks.
>>
>> A good iptables tutorial with some example scripts is here:
>> http://www.frozentux.net/documents/iptables-tutorial/
>>
>> Read at least the chapter "Limit match".
>>
>> Heiko
>>
>
>
> Thanks a lot man. But I have a doubt (may sound quite weird, but I
> really don't know about it).
> Suppose I set this-
> iptables -I INPUT -m limit --limit 1/min --limit-burst 5 -j ACCEPT
> will this affect HTTP connections?
> Basically, how many packets is probably going to constitute one connection?
> What is the recommended setting for the same to prevent DoS?

i dont know a lot about DoS or proper settings, but the connection
doesn't really depend on "packet count" or anything like that.  [IIRC]
a connection is established at the TCP level, and is kept alive at
that level.  HTTP 1.1 layer 7 "keep-alives" just keep the layer 4/5
TCP connection open.  HTTP 1.0 clients may have trouble with
connection limits if you have high request rates, as they must
establish a new connection on each request (again IIRC, could be
flawed).

C Anthony


[Index of Archives]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [Share Photos]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]
  Powered by Linux