[Bug 772] New: Rate Limiting

bugzilla-daemon at bugzilla.netfilter.org bugzilla-daemon at bugzilla.netfilter.org
Tue Feb 28 08:45:50 CET 2012


http://bugzilla.netfilter.org/show_bug.cgi?id=772

           Summary: Rate Limiting
           Product: iptables
           Version: unspecified
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: blocker
          Priority: P5
         Component: unknown
        AssignedTo: netfilter-buglog at lists.netfilter.org
        ReportedBy: AsadMoeen at hotmail.com
   Estimated Hours: 0.0


-A INPUT -m state --state NEW -m recent --set --name DEFAULT --rsource 
-A INPUT -m state --state NEW -m recent --update --seconds 1 --hitcount 10
--name DEFAULT --rsource -j DROP 


I was having DDos attack from multiple IP's on probably 3 of my machines one of
which is CentOS and two are Debian. I had added rate-limiting to my rules to
protect it but I just observed its not working and server is making 1mb/s
output easily. Someone is attacking my GameServers ports using a different IP
each day and in fact multiple IPs, each IP makes 45kb/s or lesser input and my
servers make 1mb/s + Output.


All systems were on OpenVZ running 2.6.18 kernel.

On all systems iptables version was 1.4.2+. I downgraded to 1.3.5 with RPM on
CentOS machine and iptables started working easily. Now I need an answer to why
they didn't work on later versions? Is it something related to version
compatibility with the kernel? Its definitely not the OS like I said I tested
it on Debian/ CentOS both.

Now I can't find any deb files for Debian so I want someone to help me out with
the file on Debian so that I can dpkg -i install the package and try it out on
Debian too.

Thanks!

-- 
Configure bugmail: http://bugzilla.netfilter.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.
You are watching all bug changes.



More information about the netfilter-buglog mailing list