[NCLUG] Preventing ICMP DDoS
jeff
jeff at themoes.org
Wed Aug 6 11:38:55 MDT 2003
I have a server that was under an ICMP-based DDoS attack. It was enough to
flood the 100Mbit ethernet card.
After some arm twisting I was able to get the ISP to filter out ICMP to the
target IP on one of their upstream routers. Everything was jolly again. The
problem is that it is against the "policy" of this ISP to do such filtering
and they are only doing it until the weekend. After that the attack may come
back or may still be running.
A couple "techs" there were telling me to use the firewalling rules of the
kernel to stop it. I was explaining that by the time it hits the box, the
bandwidth is already gone so it doesn't matter if I filter there or not.
To me my options appear to be 1) pray they don't attack again or 2) buy the
ISP's "PIX firewall" ($$$$) or 3) go to a different ISP.
I don't think I can count on 1. I don't want to do 2. 3 is kind of a drag
since it involves coordinating lots of volunteers (I can't just move stuff
myself) & lots of work (plus the contract).
Anyway, anyone here have a good option 4 that I'm missing? Is there some
super-majick voodoo in the kernel that can help here?
Thanks,
-Jeff
More information about the NCLUG
mailing list