
Ehrys Marakai
Caldari Evolution The Initiative.
|
Posted - 2011.05.11 09:46:00 -
[1]
Originally by: Erik CoolBreeze You are absolutely right, denial of service FROM THE OUTSIDE. But by all means, carry on your ignorant ways.
1/10 Try harder
Also, I refute your claim of 10+ years of web development experience, or do you only use Frontpage and Fireworks?
|

Ehrys Marakai
Caldari Evolution The Initiative.
|
Posted - 2011.05.11 10:57:00 -
[2]
Originally by: Erik CoolBreeze oh noes unstoppable ddos, quick shut down the internets!!!111 just another sad cry for attention. And yea I should've been more clear, 10+ years in IT in general, web development is just a part of it.
That said, I have been on both ends of ddos, and any professional web hosting company knows exactly what to do when it happens. Obviously people in here don't, so uhm, hosting it from your old desktop at home?
@OP: if you dont know how to stop the ddos, send me an evemail and I'll point you in the right direction.
/thread
There is no way to stop a DDOS attack, only to mitigate it. Although, as you profess to know the solution, please share it with us all as I'm sure there are many companies who would kill to get this kind of information (Sony, Barcleycard and PayPal to name a few)
As I mentioned mitigation earlier, I shall name a couple of ways.
1. QoS, commonly, DDOS relies on Broadcast ICMP. If you enable QoS rules for ICMP packets to lower their priority enough then your site will become at least usable for the duration of the attack (this generally requires an update to the hardware on the router/switch/firewall) 2. Disallow broadcast packets for the internal network to come from an external source. This again, requires reconfiguration of the hardware and probably something that you don't have access to. 3. If the DDOS is making a full site request, rate throttle each connection (for Apache this is mod_throttle)
Finally, which needs to be said, none of this will have any effect if the pipe itself is saturated. Regardless of QoS or throttling, if the amount of incoming requests, rejected or not, are more than the incoming connection can handle, the best thing you can do is hand it over to the authorities and let the ISP's themselves sort it out.
In most cases, the originating IP address will spoofed/masked making a trace difficult at best. Otherwise what you probably have is a zombie botnet. Which would be near impossible to shut down. Especially so in the worst case scenario (saturated bandwidth).
With every post you are demonstrating a lack of knowledge, yet stating you know everything. I find your claims difficult to ratify.
|