Udp Flood
So i've exhausted all options here.. Iptables and etc
But the UDP floods(spoofed ips) keep getting through
[root@serv888 ~]# tcpdump tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes 16:17:52.504507 IP 207.46.150.153.1024 > serv888-97-**.*.net.mns-mail: UDP, length 459 16:17:52.504515 IP 23.102.174.102.1024 > serv888-97-**.*.net.23989: UDP, length 633 16:17:52.504521 IP 23.102.174.102.1024 > serv888-97-**.*.net.30898: UDP, length 676 16:17:52.504526 IP 207.46.150.153.1024 > serv888-97-**.*.net.25766: UDP, length 673 16:17:52.504531 IP 207.46.150.153.1024 > serv888-97-**.*.net.20165: UDP, length 174
It just keeps going endlessly and iptables isn't dropping the UDP attack..
Can you offer some advice on how i'd go about blocking this?
Comments
Are you sure iptables isn't dropping the attack? This is all incoming, which can't be stopped. The only thing you can stop is outgoing packets that respond to the flood.
You might want to look into a provider with ddos protection.
http://seclists.org/tcpdump/2014/q1/114
What's the output of
If your line gets exhausted there's no way of stopping it on the server level, another option would be to counterattack. Just send a big udp flood to the attacking IP and it will stop attacking you, as their port will saturate.
Same for NSA, if the NSA hacks you then you should counterhack them back, and then say you didn't know it was NSA.
If packets are dropped it saves you sending icmp unreachable messages, but downstream is saturated anyway. Can only be solved to block at uplink router.
What services do you run there that might be a target?
It's just a simple game powered by python.
you always could use www.x4b.net if you're tired of messing around with firewalls n stuffs, its a affordable solution to your problem. Make sure that the server IP that is being attacked gets replaced first with a new one - otherwise putting x4b.net in front wont help at all since the attacker knows the real server IP already.
please make comnd tcpdump -nn -vv -xx then if you see
please inbox me, i can make you rule firewall iptables with string u32 or string hex
Not a lot of ports running half-duplex these days . . .
That's incredibly stupid advice.
And you know many UDP floods are spoofed traffic anyway, yeah?
Which means the source is unknown thus that a counter attack is rendered useless.
And he could be attaching an innocent (or a compromised server at best). And it's illegal and asking for trouble anyway.