Re: Ping flood

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



perhaps, but I think the real answer is to not allow icmp traffic to hit the braodcast address of the network or subnetwork in consideration, which is a slightly, if not totally different issue then multicast traffic passing the perimiter. Though I'm up for educatiting and clues if I am mistaken here.

thanks,

Ron DuFresne


On Tue, 1 Nov 2005, Zoltan Nagy wrote:


consider dropping all multicast packets
$ipt    -d 224.0.0.0/4                  -j DROP


Paulo Andre wrote:
I have the following log:
Nov  1 09:10:40 guardian ---SA_IN--- IN=eth1 OUT=
MAC=ff:ff:ff:ff:ff:ff:00:e0:1e:83:d5:19:08:00  SRC=64.34.170.237
DST=255.255.255.255 LEN=1072 TOS=00 PREC=0x40 TTL=243 ID=12209 DF
PROTO=ICMP TYPE=8 CODE=0 ID=0 SEQ=0

I am receiving thousands of these a day, icmp traffic is blocked with
iptables. But still this traffic is coming up the line. Is my only
solution to contact the ISP or is there something I can do in
iptables/linux?

Paulo




- -- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
        admin & senior security consultant:  sysinfo.com
                        http://sysinfo.com
Key fingerprint = 9401 4B13 B918 164C 647A  E838 B2DF AFCC 94B0 6629

...We waste time looking for the perfect lover
instead of creating the perfect love.

                -Tom Robbins <Still Life With Woodpecker>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFDaTFnst+vzJSwZikRAlzaAJ4pwFiHxbgneeHnq2unfoO1ap7m8ACgzS9j
lylmKFXRvyyJGK8wTWJRyEU=
=CGLX
-----END PGP SIGNATURE-----


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux