"Reinder P. Gerritsen" wrote:
> I've been trying to get around this problem for quite some time. Still
> though I can not figure out what to do:
>
> The following is happening:
>
> Some unknown source is sending SYN packets to port 80 on my linux box.
> These SYN packs have their sender address altered.
<..snip..>
If it can help here or in other situations, here's my /proc settings.
Among others, tcp_max_syn_backlog might be usefull...
------------
LOCALPORTRANGE="56000:65096"
# Disable forwarding while setting up rules (needed for masquerading):
echo "0" >/proc/sys/net/ipv4/ip_forward
# echo "1" >/proc/sys/net/ipv4/ip_forward
# Enable syn-cookies (prevent syn-flood attacks):
echo "1" >/proc/sys/net/ipv4/tcp_syncookies
# Reduce number of possible SYN Floods:
echo "1024" >/proc/sys/net/ipv4/tcp_max_syn_backlog
# Disable ICMP echo-request to broadcast addresses (Smurf amplifier):
echo "1" >/proc/sys/net/ipv4/icmp_echo_ignore_broadcasts
# Disable ICMP echo-request altogether (use only if DOS'ed):
#echo "1" >/proc/sys/net/ipv4/icmp_echo_ignore_all
# Enable defrag error protection:
echo 1 > /proc/sys/net/ipv4/icmp_ignore_bogus_error_responses
# Enable time-wait assassination hazards in tcp (RFC 1337):
echo "1" >/proc/sys/net/ipv4/tcp_rfc1337
# Sourcerouting and spoofing:
for i in /proc/sys/net/ipv4/conf/*; do
# Drop all source-routed packets:
echo "0" >$i/accept_source_route
# Deaktivate ICMP Redirect accept/send:
echo "0" >$i/accept_redirects
echo "0" >$i/send_redirects
# Activate secure ICMP redirects (send only?) (on by default):
echo "1" >$i/secure_redirects
# Enable source-address verification (prevent spoofing):
echo "1" >$i/rp_filter
done
# Log spoofed, source routed and redirect packets:
echo 1 >/proc/sys/net/ipv4/conf/all/log_martians
# Set local port range for listeners (ftp et al...)
# Connections initiated from the firewall: Range 56000 60999
# Masqueraded connections: Range 61000-65096.
# So, we combine these two ranges into one:
#echo "56000 65096" >/proc/sys/net/ipv4/ip_local_port_range
echo $LOCALPORTRANGE |sed 's/:/ /'
>/proc/sys/net/ipv4/ip_local_port_range
------------
Note: Using the var LOCALPORTRANGE throughout my script is more
practical than hardcoding the range, which could be subject to change.
--
Kind regards / venlig hilsen,
Mogens Valentin, Mr Dev
IT Networking, Security, Server Setup
http://www.mrdev.com [EMAIL PROTECTED]
Phone +45 32 525 878 Cell 51 227 668