If they're coming from just the single IP, then black-hole'ing their IP is easier.  If the address they're coming from is 128.115.1.1, then simply paste this at a shell prompt and give it your password when sudo asks for it:

sudo route add 128.115.1.1 gw 127.0.0.1 lo

This will cause all packets destined to go back to them to get dropped on the floor and should be sufficient.  You'd really prefer to do this (or just add them to the naughty list which is something that I believe the SW can do, even with ancient builds of their SW) on your SonicWall box, but you can get away with doing it on your server.

Adding an IP tables (again, if you can't convince your SW to just drop packets from them) is more efficient, of course, but it's hairier to set up.


On Mon, Mar 18, 2013 at 2:19 PM, J. Wade Michaelis <jwade@userfriendlytech.net> wrote:
I have a CentOS web server that has recently been brought to a halt on two separate occasions.  Checking the access.log, it appears that it was a Denial of Service (DOS) attack (hundreds of HTTP requests in a very short time, all from a single IP address).

I want to prevent these types of attacks from bringing the server to its knees.  We have a hardware firewall (SonicWall) in place, but it isn't quite new enough to run the firmware that allows rate-limiting.

I have found a number of tutorials that show how to do this type of thing with IPTABLES.  Is there a better solution? 

Supposing I go with IPTABLES, do I need to include rules to allow FTP and SSH (the only other services on the server)?  

Would any of you be willing to assist me with this?

Thanks,
~ j.
jwade@userfriendlytech.net

_______________________________________________
KCLUG mailing list
KCLUG@kclug.org
http://kclug.org/mailman/listinfo/kclug