We've had that too again.
In the latest incident I noticed that there were two different sized packets. Unfortunately I lost the tcpdump screen that had more information. The other packet size was 0, that I remember.
I've heard that new version of zBlock can disable this attack. Or then they are talking about something else. On the official site there is:
Code:
- Blocked a new server crash/lag command.
I hope it's referring to this attack.
@over_kill
It's not TCP. It's UDP and it's real bitch to track down. All that you can do is happen to play at the time somebody starts the attack. Then close the server quickly so there is no more normal server traffic. Then start tcpdump with following command:
Code:
tcpdump -n -vv -XX -s 0 'udp'
The result is lots of gibberish. You can leave -XX away so there isn't as much information printed on the screen. Then look at the last column of "length NN". There is also another column saying "length NN", but it includes also UDP header, which makes the packet look bigger. The actual payload amount is the last column.
Then if you find out what the attacker is flooding, it is possible to add new firewall rule to block all other similar attacks by blocking UDP messages of that size by executing iptables command:
Code:
iptables -I INPUT -p udp -m lenght --length NN -j DROP
Obviously it is also possible to block attacker's IP address here, but it's only very temporary solution.