Re: anti-dos

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi

On Wednesday 28 January 2004 09:14, Ray Leach wrote:
>
> You can use the limit support to limit packet rates:
>
> ### syn-flood chain
> $IPTABLES -N syn-flood
> $IPTABLES -A syn-flood -i $IFACE_INET -m limit --limit 75/s
> --limit-burst 100 -j RETURN
> $IPTABLES -A syn-flood -i $IFACE_DMZ -m limit --limit 75/s
> --limit-burst 100 -j RETURN
> $IPTABLES -A syn-flood -i $IFACE_INT -j RETURN
> $IPTABLES -A syn-flood -j LOG --log-prefix "SYN-FLOOD: "
> $IPTABLES -A syn-flood -j DROP
>
> $IPTABLES -A INPUT -i $IFACE_INT -p tcp --syn -j syn-flood
> $IPTABLES -A INPUT -i $IFACE_DMZ -p tcp --syn -j syn-flood
> $IPTABLES -A INPUT -i $IFACE_INET -p tcp --syn -j syn-flood
>
I have a questions on this. As I interpret the rules any packet with is 
not catched by the two limit-rules is targeted to LOG. 
Due to the huge number of possible SYN-Packets in a dos-attack this does 
not seem useful to me. Shouldn't there be a "-m --limit 
10/minute" in the log-rule?

with kind regards
	Axel



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux