[103269] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Mitigating HTTP DDoS attacks?

daemon@ATHENA.MIT.EDU (Barney Wolff)
Mon Mar 24 20:14:22 2008

Date: Mon, 24 Mar 2008 20:09:45 -0400
From: Barney Wolff <barney@databus.com>
To: Paul Vixie <vixie@isc.org>
Cc: nanog@merit.edu
In-Reply-To: <g3ve3bhf19.fsf@sa.vix.com>
Errors-To: owner-nanog@merit.edu


On Mon, Mar 24, 2008 at 11:34:58PM +0000, Paul Vixie wrote:
> 
> i only use or recommend operating systems that have their own host based
> firewalls.  soon that will mean pf (from openbsd but available on freebsd)
> but right now that means ipfw.  ipfw has a "table" construct which uses a
> data structure similar to the kernel's routing table.  with a little bit
> of tuning, and using X86_64 to get more kernel memory map space than I386,
> i've listed every member of 60K-node botnets in a table whose only use is
> "if a SYN comes from here, silently drop it with no ICMP response".  with
> more tuning work, a 200K-node botnet would pose no problem.  we populate
> these tables with a perl script that watches the apache server's logfiles.

Even on an untuned fbsd i386, I had success with an ipfw table with well over
1e6 entries.  What finally broke was doing a table list, possibly because the
command prints in sorted order.  No performance problems were observed at my
limited volume of perhaps 30000 hits per day.

-- 
Barney Wolff         I never met a computer I didn't like.


home help back first fref pref prev next nref lref last post