Re: SQUID & syn attack

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On November 8, 2003 06:01 am, Alex wrote:
> What rules should be set with iptables to block syn attacks and still allow
> legitimate traffic? The machine that I'm talking about is a squid cache
> server with about 200 clients which also acts as a router with NAT for one
> box on the private LAN.
>
>
> I did tried several approaches but it seems that the rules also interfere
> with client-to-squid connections.
>
> Any thoughts on that?
>
> Thanks!
>
> Alex

Hi,
if the syn is to a valid listening port, I don't see what can be done to stop 
the scan as it is a valid packet. However, if you are being flooded with 
syn's from a single source to a specific port, you may want to set IPtables 
to limit requests. Of course this may also interfere with legitimate client 
traffic to that service. i don't know that you could set a limit on an 
inbound source IP without calling some script from within the rules, which 
would likely bogg down the fw. 

I haven't tried them, but according to nmap, Synlogger and Courtney will 
detect the syn scans, so at least you could find the source and block them. 
Not too dynamic of a solution but you may get some info as to who is causing 
you greif.
-- 
Pete Nesbitt, rhce


-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list

[Index of Archives]     [CentOS]     [Kernel Development]     [PAM]     [Fedora Users]     [Red Hat Development]     [Big List of Linux Books]     [Linux Admin]     [Gimp]     [Asterisk PBX]     [Yosemite News]     [Red Hat Crash Utility]


  Powered by Linux