Linux Netfilter discussions
 help / color / mirror / Atom feed
* Hot to design syn-flood protection based on ip ?
@ 2009-08-27 12:36 J. Bakshi
  2009-09-01  6:28 ` J. Bakshi
  0 siblings, 1 reply; 6+ messages in thread
From: J. Bakshi @ 2009-08-27 12:36 UTC (permalink / raw)
  To: netfilter

Hello list,

I have finally  come to know the bad effect of syn-flood protection.

``````````````````````
iptables -N syn-flood
iptables -A INPUT -i $IFACE -p tcp --syn -j syn-flood
iptables -A syn-flood -m limit --limit 1/s --limit-burst 4 -j RETURN
iptables -A syn-flood -j DROP
```````````````````````````

The codes above drops the packets blindly if a single host initiate a
syn-flood and as a result other hosts can't get the ports.  Is there a
way to modify the rules so it drop the packets from the host which is
sending the syn-flood packets ?

eagerly waiting for a response.
Thanks

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2009-09-01  8:50 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2009-08-27 12:36 Hot to design syn-flood protection based on ip ? J. Bakshi
2009-09-01  6:28 ` J. Bakshi
2009-09-01  6:58   ` Marek Kierdelewicz
2009-09-01  7:38     ` J. Bakshi
2009-09-01  8:12       ` Marek Kierdelewicz
2009-09-01  8:50         ` J. Bakshi

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox