senseful setup against flooding attack

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi All,

i have problems and i am not not sure how to setup my flooding attack rule withe senseful values. Here is my iptable-rule:

iptables -A attacksinput -p tcp -m conntrack --ctstate NEW -m multiport --dports 1:79,81:442,444:65535 -m hashlimit --hashlimit-name attacksinnot_80 --hashlimit-upto 6/hour --hashlimit-burst 20 --hashlimit-mode srcip -j LOG --log-level info --log-prefix "attacksinput(!80): " && \

So my hashlimit-burst is only 20 and my hashlimit-upto is 6/hour. I want to run a server application which doesnt fit with this setting. The incoming connection is really fast blocked. Which values are critical or the maximal limit for a mini-ITX server with intel atom N270 cpu? I have DSL 6000.

regards Markus

--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux