Skip to content

조회 수 9206 추천 수 0 댓글 0
?

단축키

Prev이전 문서

Next다음 문서

크게 작게 위로 아래로 댓글로 가기 인쇄
?

단축키

Prev이전 문서

Next다음 문서

크게 작게 위로 아래로 댓글로 가기 인쇄

Check whether it shows lot of SYN_WAIT / TIME_WAIT / FIN_WAIT. If yes its due to the high number of connections. You can reduce these by adding some rules to the Iptables.

# iptables -A INPUT -p tcp --tcp-flags SYN,FIN SYN,FIN -j DROP
# iptables -A INPUT -p tcp --tcp-flags SYN,RST SYN,RST -j DROP
# iptables -A INPUT -p tcp --tcp-flags FIN,RST FIN,RST -j DROP
# iptables -A INPUT -p tcp --tcp-flags ACK,FIN FIN -j DROP

# service iptables save
# service iptables restart

Adding rules to sysctl.conf

Also you can reduce these by adding some rules to sysctl.conf, the details given below.

# echo 1 > /proc/sys/net/ipv4/tcp_syncookies

Put following in /etc/sysctl.conf

# Enable TCP SYN cookie protection
net.ipv4.tcp_syncookies = 1

# Decrease the time default value for tcp_fin_timeout connection
net.ipv4.tcp_fin_timeout = 30

# Turn off the tcp_window_scaling
net.ipv4.tcp_window_scaling = 0

# Turn off the tcp_sack
net.ipv4.tcp_sack = 0


Then execute the command :

A quick and usefull command for checking if a server is under ddos is:

# netstat -anp |grep 'tcp\|udp' | awk '{print $5}' | cut -d: -f1 | sort | uniq -c | sort -n

Reference : http://linuxhow2.net/?p=9


# Set default policies
/sbin/iptables -P INPUT ACCEPT
/sbin/iptables -P OUTPUT ACCEPT
/sbin/iptables -P FORWARD DROP
/sbin/iptables -F
/sbin/iptables -F INPUT
/sbin/iptables -F OUTPUT
/sbin/iptables -F FORWARD
/sbin/iptables -F -t mangle
/sbin/iptables -X
/sbin/iptables -A INPUT -i lo -j ACCEPT
/sbin/iptables -A INPUT -d 127.0.0.0/8 -j REJECT
/sbin/iptables -A INPUT -i eth0 -j ACCEPT
/sbin/iptables -A INPUT -m state --state INVALID -j DROP
### chains to DROP too many SYN-s ######
/sbin/iptables -N syn-flood
/sbin/iptables -A syn-flood -m limit --limit 100/second --limit-burst 150 -j RETURN
/sbin/iptables -A syn-flood -j LOG --log-prefix "SYN flood: "
/sbin/iptables -A syn-flood -j DROP

Reference : http://www.webhostingtalk.com/archive/index.php/t-355411.html


List of Articles
번호 제목 글쓴이 날짜 조회 수
68 iptables-connlimit & geoip 설치설정 ADMINPLAY 2009.05.28 10344
» iptables/sysctl을 이용하여 DDOS SYN 공격 방어하기 ADMINPLAY 2009.05.28 9206
66 iptables를 이용한 SSH brute force 공격방어 l2zeo 2010.05.29 19689
65 iptables와 mod_security 연동을 통한 ip 차단 file ADMINPLAY 2010.09.15 19765
64 Kernel 2.4.23 버전 이하에 나온 ptrace 버그에 관한 사항 ADMINPLAY 2009.12.13 8799
63 Linux Security ADMINPLAY 2009.07.18 9754
62 LINUX 해킹당했을 때 대처요령 l2zeo 2010.03.08 8733
61 lsof 활용 가이드 ADMINPLAY 2009.11.30 8315
60 Modsecurity 무료 웹방화벽 설치 file ADMINPLAY 2010.09.12 24051
59 modsecurity-2.5 configure: *** apr library not found. ADMINPLAY 2010.09.12 21134
58 Modsecurity-apache 2.5.12 file ADMINPLAY 2010.09.12 18709
57 Modsecurity-apache 2.5.X 설치중 에러 server: /usr/lib/... ADMINPLAY 2010.09.12 21288
56 mod_evasive를 이용한 웹Dos 공격을 막자 ADMINPLAY 2009.05.07 9427
55 mod_security 설치 2.X ADMINPLAY 2009.06.04 9412
54 ossec 로그 분석 툴 설치 ADMINPLAY 2009.10.20 11529
53 pam_abl 을 통한 SSH 무작위 공격 방어 ADMINPLAY 2009.06.04 8733
52 PHP 보안관련 설정 권고사항 ADMINPLAY 2010.05.19 20210
51 PHP 보안의 약방의 감초 open_basedir ADMINPLAY 2014.01.02 7523
50 php 수호신 설치 ADMINPLAY 2010.05.03 20826
49 php.ini 보안 설정 ADMINPLAY 2010.05.03 20375
Board Pagination Prev 1 2 3 4 5 Next
/ 5

Copyright ADMINPLAY corp. All rights reserved.

abcXYZ, 세종대왕,1234

abcXYZ, 세종대왕,1234