[Bug 772] New: Rate Limiting
bugzilla-daemon at bugzilla.netfilter.org
bugzilla-daemon at bugzilla.netfilter.org
Tue Feb 28 08:45:50 CET 2012
http://bugzilla.netfilter.org/show_bug.cgi?id=772
Summary: Rate Limiting
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: blocker
Priority: P5
Component: unknown
AssignedTo: netfilter-buglog at lists.netfilter.org
ReportedBy: AsadMoeen at hotmail.com
Estimated Hours: 0.0
-A INPUT -m state --state NEW -m recent --set --name DEFAULT --rsource
-A INPUT -m state --state NEW -m recent --update --seconds 1 --hitcount 10
--name DEFAULT --rsource -j DROP
I was having DDos attack from multiple IP's on probably 3 of my machines one of
which is CentOS and two are Debian. I had added rate-limiting to my rules to
protect it but I just observed its not working and server is making 1mb/s
output easily. Someone is attacking my GameServers ports using a different IP
each day and in fact multiple IPs, each IP makes 45kb/s or lesser input and my
servers make 1mb/s + Output.
All systems were on OpenVZ running 2.6.18 kernel.
On all systems iptables version was 1.4.2+. I downgraded to 1.3.5 with RPM on
CentOS machine and iptables started working easily. Now I need an answer to why
they didn't work on later versions? Is it something related to version
compatibility with the kernel? Its definitely not the OS like I said I tested
it on Debian/ CentOS both.
Now I can't find any deb files for Debian so I want someone to help me out with
the file on Debian so that I can dpkg -i install the package and try it out on
Debian too.
Thanks!
--
Configure bugmail: http://bugzilla.netfilter.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.
You are watching all bug changes.
More information about the netfilter-buglog
mailing list