On Thu, 12 Aug 1999, Nick Rogness wrote:
> > what rules should I add to my ipfw ruleset to block out icmp
> > floods and smurf attacts, etc thanks.
> For smurf attacks, I've done it 2 different ways before, assuming
> your local net is 192.168.0.0/24:
> # Permit traffic from local net 192.168.0.0/24 to broadcast addr.
> ipfw add 1000 permit ip from 192.168.0.0/24 to 192.168.0.255/32
> # Deny log traffic from outside local net to local broadcast
> ipfw add 2000 deny log ip from any to 192.168.0.255/32 in via de0
Doesn't that just stop you from being used as a smurf amplifier? I think
the original poster wanted to know how to defend against being a smurf
victim, which is much more difficult. The best resources I've seen for
understanding smurf attacks are:
Defending against smurf attacks is hard because by the time you receive
the smurf traffic on your network, much of the damage has already been
done. And believe me, you WILL notice that something is happening when
you're feeling the brunt of a 60 Mb/s sustained smurf attack. :-)
Paul Robert Hart ><8> ><8> ><8> Verio Web Hosting, Inc.
firstname.lastname@example.org ><8> ><8> ><8> http://www.iserver.com/
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message