Visa ett inlägg
Oläst 2006-12-18, 21:29 #17
N!cklas N!cklas är inte uppkopplad
Mycket flitig postare
 
Reg.datum: Mar 2004
Inlägg: 865
N!cklas N!cklas är inte uppkopplad
Mycket flitig postare
 
Reg.datum: Mar 2004
Inlägg: 865
Senaste svaret:
Citat:
We have installed apf and mod_evasive for prevent this in the future. There were large number of httpd (port 80) connections from the IPs. Mod_evasive is an evasive maneuvers module for Apache to provide evasive action in the event of an HTTP DoS or DDoS attack or brute force attack. It is also designed to be a detection and network management tool, and can be easily configured to talk to ipchains, firewalls, routers, and etcetera. mod_evasive presently reports abuses via email and syslog facilities.
Får fortfarande inget svar på mina frågor varför jag börjar bli än mer fundersam...

Mitt svar:
Citat:
Hi again,
I take your last reply as the answer to my last question, as this seems to be a good prevention for future attacks.

But I'm also a bit confused. In an earlier ticket (#APW-16320-242) I asked to have APF and BFD installed and was told: "We are sorry to say that after logging into your server, we were able to make out it is a FreeBSD server and apf and bfd cannot be installed in a freebsd server"

Instead IPFW was installed after recommendation from support-staff.

Lastly; 3 questions remains unanswered...
- What kind of DoS attack was it?
- From which IP adress(es) did it originate?
- Why doesn't the attack show in my graphs?

Best regards
Nicklas
N!cklas är inte uppkopplad   Svara med citatSvara med citat