Hello,

We experience frequent DDOS attacks, and we're having a tough time
mitigating them with pf.  We have plenty of bandwidth and processing
power, we just can't seem to get the rules right.

If, for example, I have a single IP address on the outside attacking a
range of IPs on the inside, it is very easy to write a max-src-states
rule that will count the states for that IP and flush the attacker to
a "drop quick" table if they exceed the limit.

However, the nature of a DDOS attack is that there is not a single
source IP.  The source IP is either outright forged or one of a large
number of compromised attacking hosts.  So what I really want to do is
have a "max-dst-states" rule that would at least temporarily blackhole
an IP being attacked, but there's no such thing.

Currently we have to run a script once per minute that parses "pfctl
-s info" looking for large numbers of states to a common destination.
But as we have our states set to 1000000, this is really inefficient
and of course takes at least a minute to catch up to an attack.

Is there a better way to do this?

This is on FreeBSD 9.1-PRERELEASE #0 r238540.

Thanks for any help!
_______________________________________________
freebsd-pf@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-pf
To unsubscribe, send any mail to "freebsd-pf-unsubscr...@freebsd.org"

Reply via email to