jeff wrote:
Sean Knox wrote:

<tcpdump logs and pf.conf snipped>

The only people who can help is your ISP. Talk to them and hopefully they can trace the attack upstream.


I once added this to pf.conf to mitigate a DDoS. It appeared to have worked, but it may have been a placebo effect ;)

set optimization aggressive
set timeout tcp.first 45
set timeout tcp.established 43200
set timeout { adaptive.start 30000, adaptive.end 45000 }
set limit states 40000



This might help with a SYN attack as long you still have available bandwidth. Additionally, this wouldn't help against any non-TCP packet. If an attacker is exhausting your pipe, all the firewalling in the world won't help. You'll have to have upstream ISPs route the packets into /dev/null.

sk

Reply via email to