HELP: how to block faked RST packet

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



My web server recently received lot of fake RST packets, these packets
faked normal client src addr and mac addr but with different TTL.

I added one iptables rule as below to filter these packets:


iptables -A INPUT -p tcp -i eth0 --tcp-flags ACK,SYN,FIN,RST,URG,PSH
RST -j DROP


This rule works, but client ofter can not view a complete webpage
unless refresh the page a few times.


Is there any way that i can find where these packet from? i can trace
to one router according to the TTL value, but that's all i can do now.


Or how can i filter these RST packet with iptables or something else
without interfere normal http communication?
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux