Hello Willi,

i am using 1.4.1.

Set up new rule with tarpit....
Rate decreased below 40/secs.

regards
Bernhard


----- Nachricht von [email protected] ---------
     Datum: Tue, 16 Mar 2010 10:44:24 +0100
       Von: Willy Tarreau <[email protected]>
Antwort an: Willy Tarreau <[email protected]>
   Betreff: Re: Dos-Attack / Drop Connections
        An: Bernhard Krieger <[email protected]>
        Cc: [email protected]


On Tue, Mar 16, 2010 at 10:32:40AM +0100, Bernhard Krieger wrote:
Hello Willi,

thanks for reply.
If i change the rule to block the requests, the Session rate grow up
to 1000/secs.
If i use the redirection option ( to http://127.0.0.1 ), it decreases
to 500/secs.

It means that the attacker immediately retries. Then use a tarpit, it
will slow it down a lot. On what version are your running ? With 1.4
you can condition the tarpit with an ACL :

        timeout tarpit 1m
        reqtarpit . if ! { hdr_reg(user-agent) . }

On 1.3 it will be a bit more complicated, you'll have to branch to a
specific backend for the tarpit :

frontend ...
      acl ua-ok hdr_reg(user-agent) .
      use_backend bk_tarpit if !ua-ok

backend bk_tarpit
      timeout tarpit 1m
      reqtarpit .


The DOS-Attack iteself is very strange, it attacks my old clanpage
which has not more than 10 requests per month ... a very high visited
page ;)

The attack produces only traffic... he will never reach the final goal :)

Well, never underestimate a DoS attack. There is often a first phase of
identification of the target. You should also avoid publicly discussing
the reasons why you think it will not succeed and the workarounds you
are setting up ! If the guy really wants to take you down, he just has
to read the list's archives to update his attack vector.

Regards,
Willy




----- Ende der Nachricht von [email protected] -----



----------------------------------------------------------------
This message was sent using IMP, the Internet Messaging Program.


Reply via email to