Skip to content

조회 수 9208 추천 수 0 댓글 0
?

단축키

Prev이전 문서

Next다음 문서

크게 작게 위로 아래로 댓글로 가기 인쇄
?

단축키

Prev이전 문서

Next다음 문서

크게 작게 위로 아래로 댓글로 가기 인쇄

Check whether it shows lot of SYN_WAIT / TIME_WAIT / FIN_WAIT. If yes its due to the high number of connections. You can reduce these by adding some rules to the Iptables.

# iptables -A INPUT -p tcp --tcp-flags SYN,FIN SYN,FIN -j DROP
# iptables -A INPUT -p tcp --tcp-flags SYN,RST SYN,RST -j DROP
# iptables -A INPUT -p tcp --tcp-flags FIN,RST FIN,RST -j DROP
# iptables -A INPUT -p tcp --tcp-flags ACK,FIN FIN -j DROP

# service iptables save
# service iptables restart

Adding rules to sysctl.conf

Also you can reduce these by adding some rules to sysctl.conf, the details given below.

# echo 1 > /proc/sys/net/ipv4/tcp_syncookies

Put following in /etc/sysctl.conf

# Enable TCP SYN cookie protection
net.ipv4.tcp_syncookies = 1

# Decrease the time default value for tcp_fin_timeout connection
net.ipv4.tcp_fin_timeout = 30

# Turn off the tcp_window_scaling
net.ipv4.tcp_window_scaling = 0

# Turn off the tcp_sack
net.ipv4.tcp_sack = 0


Then execute the command :

A quick and usefull command for checking if a server is under ddos is:

# netstat -anp |grep 'tcp\|udp' | awk '{print $5}' | cut -d: -f1 | sort | uniq -c | sort -n

Reference : http://linuxhow2.net/?p=9


# Set default policies
/sbin/iptables -P INPUT ACCEPT
/sbin/iptables -P OUTPUT ACCEPT
/sbin/iptables -P FORWARD DROP
/sbin/iptables -F
/sbin/iptables -F INPUT
/sbin/iptables -F OUTPUT
/sbin/iptables -F FORWARD
/sbin/iptables -F -t mangle
/sbin/iptables -X
/sbin/iptables -A INPUT -i lo -j ACCEPT
/sbin/iptables -A INPUT -d 127.0.0.0/8 -j REJECT
/sbin/iptables -A INPUT -i eth0 -j ACCEPT
/sbin/iptables -A INPUT -m state --state INVALID -j DROP
### chains to DROP too many SYN-s ######
/sbin/iptables -N syn-flood
/sbin/iptables -A syn-flood -m limit --limit 100/second --limit-burst 150 -j RETURN
/sbin/iptables -A syn-flood -j LOG --log-prefix "SYN flood: "
/sbin/iptables -A syn-flood -j DROP

Reference : http://www.webhostingtalk.com/archive/index.php/t-355411.html


  1. iptables-connlimit & geoip 설치설정

    Date2009.05.28 ByADMINPLAY Views10345
    Read More
  2. iptables/sysctl을 이용하여 DDOS SYN 공격 방어하기

    Date2009.05.28 ByADMINPLAY Views9208
    Read More
  3. iptables를 이용한 SSH brute force 공격방어

    Date2010.05.29 Byl2zeo Views19704
    Read More
  4. iptables와 mod_security 연동을 통한 ip 차단

    Date2010.09.15 ByADMINPLAY Views19779
    Read More
  5. Kernel 2.4.23 버전 이하에 나온 ptrace 버그에 관한 사항

    Date2009.12.13 ByADMINPLAY Views8800
    Read More
  6. Linux Security

    Date2009.07.18 ByADMINPLAY Views9755
    Read More
  7. LINUX 해킹당했을 때 대처요령

    Date2010.03.08 Byl2zeo Views8734
    Read More
  8. lsof 활용 가이드

    Date2009.11.30 ByADMINPLAY Views8316
    Read More
  9. Modsecurity 무료 웹방화벽 설치

    Date2010.09.12 ByADMINPLAY Views24064
    Read More
  10. modsecurity-2.5 configure: *** apr library not found.

    Date2010.09.12 ByADMINPLAY Views21151
    Read More
  11. Modsecurity-apache 2.5.12

    Date2010.09.12 ByADMINPLAY Views18722
    Read More
  12. Modsecurity-apache 2.5.X 설치중 에러 server: /usr/lib/...

    Date2010.09.12 ByADMINPLAY Views21307
    Read More
  13. mod_evasive를 이용한 웹Dos 공격을 막자

    Date2009.05.07 ByADMINPLAY Views9429
    Read More
  14. mod_security 설치 2.X

    Date2009.06.04 ByADMINPLAY Views9413
    Read More
  15. ossec 로그 분석 툴 설치

    Date2009.10.20 ByADMINPLAY Views11530
    Read More
  16. pam_abl 을 통한 SSH 무작위 공격 방어

    Date2009.06.04 ByADMINPLAY Views8734
    Read More
  17. PHP 보안관련 설정 권고사항

    Date2010.05.19 ByADMINPLAY Views20223
    Read More
  18. PHP 보안의 약방의 감초 open_basedir

    Date2014.01.02 ByADMINPLAY Views7536
    Read More
  19. php 수호신 설치

    Date2010.05.03 ByADMINPLAY Views20840
    Read More
  20. php.ini 보안 설정

    Date2010.05.03 ByADMINPLAY Views20389
    Read More
Board Pagination Prev 1 2 3 4 5 Next
/ 5

Copyright ADMINPLAY corp. All rights reserved.

abcXYZ, 세종대왕,1234

abcXYZ, 세종대왕,1234