Protection Ataque dedié

Je l’est mais ca ne change pas grand chose.
Maintenant j’ai un autre prob avec mon script iptables mon char,et map serveur ne comunique plus essemble.
I a un truc a une commande a faire?

[quote=“villers”]Je l’est mais ca ne change pas grand chose.
Maintenant j’ai un autre prob avec mon script iptables mon char,et map serveur ne comunique plus essemble.
I a un truc a une commande a faire?[/quote]

Ok, car moi aussi, j’ai essayé le tcp_syncookies et ça na rien changé.

je cite venant d’un autre forum

Si ca peut aider… tiens moi au courant :smt006

Comment filtrer, avec iptables, les paquet ayant une taille de fenetre tcp bien précise (512).

Fais nous un screen de ton tcpdump

faudrai que je drop ca win 512 c avec ca qu’il lance ses attaque la j’en subi encore une en ce momment.

RE bonsoir ;=) je te met le scrin de tcpdump que j’ai obtenu en fessant

[quote]tcpdump -w capture.dump
tcpdump -v -r capture.dump >> capture.txt[/quote]
J’ai lessé tourné a peu pres 10seconde.

[code]22:39:57.368989 IP (tos 0x0, ttl 177, id 8126, offset 0, flags [none], proto: TCP (6), length: 40) 126.48.239.48.3404 > ns28236.ovh.net.6900: S, cksum 0xea5b (correct), 1056262709:1056262709(0) win 512
22:39:57.369049 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: TCP (6), length: 40) ns28236.ovh.net.6900 > 126.48.239.48.3404: R, cksum 0xd93e (correct), 0:0(0) ack 1056262710 win 0
22:39:57.369054 IP (tos 0x0, ttl 42, id 0, offset 0, flags [DF], proto: TCP (6), length: 44) 205.152.7.168.13673 > ns28236.ovh.net.6900: R, cksum 0x3947 (correct), 1200845133:1200845133(0) ack 601722332 win 5840 <mss 1460>
22:39:57.369059 IP (tos 0x0, ttl 42, id 0, offset 0, flags [DF], proto: TCP (6), length: 44) 205.152.7.163.20902 > ns28236.ovh.net.5121: R, cksum 0x3338 (correct), 1592689895:1592689895(0) ack 1833372231 win 5840 <mss 1460>
22:39:57.369063 IP (tos 0x0, ttl 177, id 4666, offset 0, flags [none], proto: TCP (6), length: 40) 253.156.138.246.3406 > ns28236.ovh.net.6900: S, cksum 0x631b (correct), 2117657240:2117657240(0) win 512
22:39:57.369069 IP (tos 0x0, ttl 177, id 3282, offset 0, flags [none], proto: TCP (6), length: 40) 248.177.4.242.3407 > ns28236.ovh.net.6900: S, cksum 0x069a (correct), 113564494:113564494(0) win 512
22:39:57.369076 IP (tos 0x0, ttl 177, id 35173, offset 0, flags [none], proto: TCP (6), length: 40) 215.61.146.203.3408 > ns28236.ovh.net.6900: S, cksum 0xef74 (correct), 1268183115:1268183115(0) win 512
22:39:57.369110 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: TCP (6), length: 40) ns28236.ovh.net.6900 > 215.61.146.203.3408: R, cksum 0x29db (correct), 0:0(0) ack 1268183116 win 0
22:39:57.369113 IP (tos 0x0, ttl 177, id 58867, offset 0, flags [none], proto: TCP (6), length: 40) 229.77.178.166.3411 > ns28236.ovh.net.6900: S, cksum 0xaf58 (correct), 963715851:963715851(0) win 512
22:39:57.369118 IP (tos 0x0, ttl 186, id 25772, offset 0, flags [none], proto: TCP (6), length: 40) adsl-76-194-233-151.dsl.lsan03.sbcglobal.net.43102 > ns28236.ovh.net.6900: S, cksum 0xe158 (correct), 206114868:206114868(0) win 512
22:39:57.369134 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: TCP (6), length: 40) ns28236.ovh.net.6900 > adsl-76-194-233-151.dsl.lsan03.sbcglobal.net.43102: R, cksum 0xe1e0 (correct), 0:0(0) ack 206114869 win 0
22:39:57.369137 IP (tos 0x0, ttl 43, id 0, offset 0, flags [DF], proto: TCP (6), length: 44) 205.152.7.231.28739 > ns28236.ovh.net.6900: R, cksum 0xa887 (correct), 1463142220:1463142220(0) ack 3852123171 win 5840 <mss 1460>
22:39:57.369144 IP (tos 0x0, ttl 42, id 0, offset 0, flags [DF], proto: TCP (6), length: 44) 205.152.7.170.14002 > ns28236.ovh.net.6900: R, cksum 0x7671 (correct), 931898357:931898357(0) ack 1354366954 win 5840 <mss 1460>
22:39:57.369152 IP (tos 0x0, ttl 177, id 451, offset 0, flags [none], proto: TCP (6), length: 40) 239.155.139.77.3418 > ns28236.ovh.net.6900: S, cksum 0x0d73 (correct), 1624901543:1624901543(0) win 512
22:39:57.369158 IP (tos 0x0, ttl 177, id 54941, offset 0, flags [none], proto: TCP (6), length: 40) 229.241.13.130.3417 > ns28236.ovh.net.6900: S, cksum 0xfcec (correct), 1099692756:1099692756(0) win 512
22:39:57.369163 IP (tos 0x0, ttl 177, id 49607, offset 0, flags [none], proto: TCP (6), length: 40) 245.26.1.234.3414 > ns28236.ovh.net.6900: S, cksum 0x3bf1 (correct), 1451472808:1451472808(0) win 512
22:39:57.369170 IP (tos 0x0, ttl 186, id 39003, offset 0, flags [none], proto: TCP (6), length: 40) 14.250.105.138.43103 > ns28236.ovh.net.6900: S, cksum 0x43fb (correct), 566830808:566830808(0) win 512
22:39:57.369201 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: TCP (6), length: 40) ns28236.ovh.net.6900 > 14.250.105.138.43103: R, cksum 0x7391 (correct), 0:0(0) ack 566830809 win 0
22:39:57.369204 IP (tos 0x0, ttl 42, id 0, offset 0, flags [DF], proto: TCP (6), length: 44) 205.152.7.192.39369 > ns28236.ovh.net.6900: R, cksum 0xbbf7 (correct), 1396497282:1396497282(0) ack 1682239597 win 5840 <mss 1460>
22:39:57.369208 IP (tos 0x0, ttl 42, id 0, offset 0, flags [DF], proto: TCP (6), length: 44) 205.152.7.168.13673 > ns28236.ovh.net.6900: R, cksum 0x3947 (correct), 0:0(0) ack 1 win 5840 <mss 1460>
22:39:57.369212 IP (tos 0x0, ttl 177, id 12312, offset 0, flags [none], proto: TCP (6), length: 40) softbank126075224105.bbtec.net.3425 > ns28236.ovh.net.6900: S, cksum 0x32e4 (correct), 675589488:675589488(0) win 512
22:39:57.369230 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: TCP (6), length: 40) ns28236.ovh.net.6900 > softbank126075224105.bbtec.net.3425: R, cksum 0x9b4b (correct), 0:0(0) ack 675589489 win 0
22:39:57.369235 IP (tos 0x0, ttl 177, id 63960, offset 0, flags [none], proto: TCP (6), length: 40) 240.185.129.184.3423 > ns28236.ovh.net.6900: S, cksum 0x08cc (correct), 1243389994:1243389994(0) win 512
22:39:57.369240 IP (tos 0x0, ttl 186, id 13853, offset 0, flags [none], proto: TCP (6), length: 40) adsl-76-254-9-248.dsl.pltn13.sbcglobal.net.43106 > ns28236.ovh.net.6900: S, cksum 0xe46a (correct), 341892629:341892629(0) win 512
22:39:57.369256 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: TCP (6), length: 40) ns28236.ovh.net.6900 > adsl-76-254-9-248.dsl.pltn13.sbcglobal.net.43106: R, cksum 0xeb47 (correct), 0:0(0) ack 341892630 win 0
22:39:57.369259 IP (tos 0x0, ttl 186, id 40717, offset 0, flags [none], proto: TCP (6), length: 40) c-67-182-178-39.hsd1.ca.comcast.net.43107 > ns28236.ovh.net.6900: S, cksum 0xc224 (correct), 364351262:364351262(0) win 512
22:39:57.369276 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: TCP (6), length: 40) ns28236.ovh.net.6900 > c-67-182-178-39.hsd1.ca.comcast.net.43107: R, cksum 0x99ff (correct), 0:0(0) ack 364351263 win 0
22:39:57.369279 IP (tos 0x0, ttl 177, id 20606, offset 0, flags [none], proto: TCP (6), length: 40) 139.59.207.147.3420 > ns28236.ovh.net.6900: S, cksum 0x3534 (correct), 1996961734:1996961734(0) win 512
22:39:57.369314 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: TCP (6), length: 40) ns28236.ovh.net.6900 > 139.59.207.147.3420: R, cksum 0xc61d (correct), 0:0(0) ack 1996961735 win 0
22:39:57.369317 IP (tos 0x0, ttl 42, id 0, offset 0, flags [DF], proto: TCP (6), length: 44) 205.152.7.170.38497 > ns28236.ovh.net.6900: R, cksum 0x1abe (correct), 421782770:421782770(0) ack 748486006 win 5840 <mss 1460>
22:39:57.369322 IP (tos 0x0, ttl 42, id 0, offset 0, flags [DF], proto: TCP (6), length: 44) 205.152.7.205.45623 > ns28236.ovh.net.6900: R, cksum 0x7b6a (correct), 904411738:904411738(0) ack 1452074164 win 5840 <mss 1460>
22:39:57.369326 IP (tos 0x0, ttl 41, id 0, offset 0, flags [DF], proto: TCP (6), length: 44) 205.152.7.198.25830 > ns28236.ovh.net.6900: R, cksum 0x6697 (correct), 1997934601:1997934601(0) ack 1547446867 win 5840 <mss 1460>
22:39:57.369331 IP (tos 0x0, ttl 186, id 30827, offset 0, flags [none], proto: TCP (6), length: 40) 9.198.36.10.43108 > ns28236.ovh.net.6900: S, cksum 0xe479 (correct), 1373271596:1373271596(0) win 512
22:39:57.369348 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: TCP (6), length: 40) ns28236.ovh.net.6900 > 9.198.36.10.43108: R, cksum 0x3edb (correct), 0:0(0) ack 1373271597 win 0
22:39:57.369351 IP (tos 0x0, ttl 42, id 0, offset 0, flags [DF], proto: TCP (6), length: 44) 205.152.7.163.20902 > ns28236.ovh.net.5121: R, cksum 0x3338 (correct), 0:0(0) ack 1 win 5840 <mss 1460>
22:39:57.369355 IP (tos 0x0, ttl 41, id 0, offset 0, flags [DF], proto: TCP (6), length: 44) 205.152.7.198.58111 > ns28236.ovh.net.6900: R, cksum 0x2f7a (correct), 1597218771:1597218771(0) ack 3268412635 win 5840 <mss 1460>
22:39:57.369358 IP (tos 0x0, ttl 43, id 0, offset 0, flags [DF], proto: TCP (6), length: 44) 205.152.7.231.28739 > ns28236.ovh.net.6900: R, cksum 0xa887 (correct), 0:0(0) ack 1 win 5840 <mss 1460>
22:39:57.369362 IP (tos 0x0, ttl 42, id 0, offset 0, flags [DF], proto: TCP (6), length: 44) 205.152.7.170.14002 > ns28236.ovh.net.6900: R, cksum 0x7671 (correct), 0:0(0) ack 1 win 5840 <mss 1460>
22:39:57.369366 IP (tos 0x0, ttl 42, id 0, offset 0, flags [DF], proto: TCP (6), length: 44) 205.152.7.204.50795 > ns28236.ovh.net.6900: R, cksum 0x132f (correct), 1507985671:1507985671(0) ack 3935220243 win 5840 <mss 1460>
22:39:57.369370 IP (tos 0x0, ttl 177, id 63801, offset 0, flags [none], proto: TCP (6), length: 40) 147.174.50.234.3428 > ns28236.ovh.net.6900: S, cksum 0x9a7a (correct), 296644815:296644815(0) win 512
22:39:57.369386 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: TCP (6), length: 40) ns28236.ovh.net.6900 > 147.174.50.234.3428: R, cksum 0x869c (correct), 0:0(0) ack 296644816 win 0
22:39:57.369389 IP (tos 0x0, ttl 177, id 30605, offset 0, flags [none], proto: TCP (6), length: 40) 78.93.209.12.3427 > ns28236.ovh.net.6900: S, cksum 0xd3e8 (correct), 1049532977:1049532977(0) win 512

22:49:32.911873 IP (tos 0x0, ttl 42, id 0, offset 0, flags [DF], proto: TCP (6), length: 44) 205.152.7.171.49158 > ns28236.ovh.net.6900: R, cksum 0x3e17 (correct), 794775536:794775536(0) ack 2927471964 win 5840 <mss 1460>
22:49:32.911877 IP (tos 0x0, ttl 42, id 0, offset 0, flags [DF], proto: TCP (6), length: 44) 205.152.7.237.52980 > ns28236.ovh.net.6900: R, cksum 0xda35 (correct), 1845592920:1845592920(0) ack 3337058201 win 5840 <mss 1460>
22:49:32.911879 IP (tos 0x0, ttl 177, id 17254, offset 0, flags [none], proto: TCP (6), length: 40) 139.215.237.91.20108 > ns28236.ovh.net.6900: S, cksum 0x5af6 (correct), 1910637747:1910637747(0) win 512
22:49:32.911880 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto: TCP (6), length: 40) ns28236.ovh.net.6900 > 139.215.237.91.20108: R, cksum 0x9ec1 (correct), 0:0(0) ack 1910637748 win 0
22:49:32.911881 IP (tos 0x0, ttl 42, id 0, offset 0, flags [DF], proto: TCP (6), length: 44) 205.152.7.168.60749 > ns28236.ovh.net.6900: R, cksum 0x37f0 (correct), 1855533505:1855533505(0) ack 2758373192 win 5840 <mss 1460>[/code]

ps je poste mon script iptables.

[code]ROOT=“91.121.92.76”

IPS distantes

DNS=“213.186.33.99”

on flush tout

iptables -F
iptables -F INPUT
iptables -F OUTPUT
iptables -F FORWARD
iptables -F -t mangle
iptables -F -t nat
iptables -X

on accepte rien

iptables -P INPUT DROP
iptables -P OUTPUT DROP
iptables -P FORWARD DROP

#iptables -I INPUT -m ttl --ttl-eq 197 -j DROP

on acepte ce qui est deja établis

iptables -A OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT

on accepte ssh en ecoute

iptables -A INPUT -p tcp --sport 1024:65535 --dport 22 -m state --state NEW -j ACCEPT
iptables -A INPUT -p tcp --sport 1024:65535 --dport 80 -m state --state NEW -j ACCEPT
iptables -A INPUT -p tcp --sport 1024:65535 --dport 6900 -m state --state NEW -j ACCEPT
iptables -A INPUT -p tcp --sport 1024:65535 --dport 6121 -m state --state NEW -j ACCEPT
iptables -A INPUT -p tcp --sport 1024:65535 --dport 5121 -m state --state NEW -j ACCEPT
iptables -A INPUT -p tcp --sport 1024:65535 --dport 14534 -m state --state NEW -j ACCEPT
iptables -A INPUT -p tcp --sport 1024:65535 --dport 51234 -m state --state NEW -j ACCEPT
iptables -A INPUT -p udp --sport 1024:65535 --dport 8767 -m state --state NEW -j ACCEPT
#iptables -A INPUT -p tcp --sport 1024:65535 --dport 3306 -m state --state NEW -j ACCEPT

iptables -A INPUT -p tcp --sport 1024:65535 --dport 3306 -m state --state NEW -j ACCEPT -d 127.0.0.1
iptables -A INPUT -p tcp --sport 1024:65535 --dport 6900 -m state --state NEW -j ACCEPT -d 127.0.0.1
iptables -A INPUT -p tcp --sport 1024:65535 --dport 6121 -m state --state NEW -j ACCEPT -d 127.0.0.1
iptables -A INPUT -p tcp --sport 1024:65535 --dport 5121 -m state --state NEW -j ACCEPT -d 127.0.0.1

iptables -A OUTPUT -p tcp --dport 80 -j ACCEPT
iptables -A OUTPUT -p tcp --dport 20 -j ACCEPT
iptables -A OUTPUT -p tcp --dport 21 -j ACCEPT
iptables -A OUTPUT -p tcp --dport 3306 -j ACCEPT
iptables -A OUTPUT -p tcp --dport 6900 -j ACCEPT
iptables -A OUTPUT -p tcp --dport 6121 -j ACCEPT
iptables -A OUTPUT -p tcp --dport 5121 -j ACCEPT
iptables -A OUTPUT -p tcp --dport 14534 -j ACCEPT
iptables -A OUTPUT -p tcp --dport 51234 -j ACCEPT
iptables -A OUTPUT -p udp --dport 8767 -j ACCEPT

on accepte les ping d ovh

#iptables -A INPUT -p icmp --icmp-type 8 -d $ROOT -s $PING_OVH -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
#iptables -A INPUT -p icmp --icmp-type 0 -s $ROOT -d $PING_OVH -m state --state ESTABLISHED,RELATED -j ACCEPT
iptables -A INPUT -p icmp --icmp-type 8 -m state --state NEW,ESTABLISHED,RELATED -j ACCEPT
iptables -A INPUT -p icmp --icmp-type 0 -m state --state ESTABLISHED,RELATED -j ACCEPT

on accepte le dns vers le serveur dns d ovh

iptables -A OUTPUT -p udp --destination-port 53 -j ACCEPT -d $DNS -s $ROOT

#a virer si des joueur peuvent pas se connect
#iptables -I INPUT -m ttl --ttl-eq 64 -j DROP

iptables -I INPUT -m ttl --ttl-eq 197 -j DROP
iptables -I INPUT -m ttl --ttl-eq 61 -j DROP
iptables -A INPUT -p tcp --sport 1024:65535 -m state --state NEW -j ACCEPT

iptables -I INPUT -m ttl --ttl-eq 97 -j DROP
iptables -I INPUT -m ttl --ttl-eq 177 -j DROP
iptables -I INPUT -m ttl --ttl-eq 186 -j DROP
iptables -I INPUT -m ttl --ttl-eq 42 -j DROP
iptables -I INPUT -m ttl --ttl-eq 41 -j DROP
iptables -I INPUT -m ttl --ttl-eq 43 -j DROP

iptables -I INPUT -s 205.152.7.168 -j DROP
iptables -I INPUT -s 205.152.7.170 -j DROP
iptables -I INPUT -s 205.152.7.192 -j DROP
iptables -I INPUT -s 205.152.7.172 -j DROP
iptables -I INPUT -s 205.152.7.205 -j DROP
iptables -I INPUT -s 205.152.7.163 -j DROP
iptables -I INPUT -s 205.152.7.204 -j DROP
iptables -I INPUT -s 205.152.7.200 -j DROP
iptables -I INPUT -s 205.152.7.171 -j DROP
iptables -I INPUT -s 205.152.7.231 -j DROP
iptables -I INPUT -s 205.152.7.233 -j DROP
iptables -I INPUT -s 205.152.7.237 -j DROP
iptables -I INPUT -s 205.152.7.198 -j DROP
iptables -I INPUT -s 205.152.7.192 -j DROP

iptables -I OUTPUT -s 205.152.7.168 -j DROP
iptables -I OUTPUT -s 205.152.7.170 -j DROP
iptables -I OUTPUT -s 205.152.7.192 -j DROP
iptables -I OUTPUT -s 205.152.7.172 -j DROP
iptables -I OUTPUT -s 205.152.7.205 -j DROP
iptables -I OUTPUT -s 205.152.7.163 -j DROP
iptables -I OUTPUT -s 205.152.7.204 -j DROP
iptables -I OUTPUT -s 205.152.7.200 -j DROP
iptables -I OUTPUT -s 205.152.7.171 -j DROP
iptables -I OUTPUT -s 205.152.7.231 -j DROP
iptables -I OUTPUT -s 205.152.7.233 -j DROP
iptables -I OUTPUT -s 205.152.7.237 -j DROP
iptables -I OUTPUT -s 205.152.7.198 -j DROP
iptables -I OUTPUT -s 205.152.7.192 -j DROP

iptables -A INPUT -s 205.152.0.0/32 -p tcp -j DROP
iptables -A INPUT -s 205.152.0.0/32 -p udp -j DROP
iptables -A OUTPUT -s 205.152.0.0/32 -p tcp -j DROP
iptables -A OUTPUT -s 205.152.0.0/32 -p udp -j DROP[/code]

Ps: il y a 12 ou 13 dedier contre le mien^^ etil me prenne toute la bande passante avec leur envoi de packet (regarder)

Entrée : 76.1 Mb/s
Sortie : 5842.2 kb/s

Entrée : 9412.7 packet/s
Sortie : 489.1 packet/s

J’en drop déjà une grosse partit.

Ne mets pas /32 mais /16 dans les lignes

iptables -A INPUT -s 205.152.0.0/32 -p tcp -j DROP iptables -A INPUT -s 205.152.0.0/32 -p udp -j DROP iptables -A OUTPUT -s 205.152.0.0/32 -p tcp -j DROP iptables -A OUTPUT -s 205.152.0.0/32 -p udp -j DROP

Sinon, tu n’interdit que l’IP 205.152.0.0.
d’autrepart, pourquoi les refusent tu en sortie, c’est en entrée que ça t’intéresse, là c’est ton serveur que tu enquiquines. C’est pourça que tu es obligez de faire les 205.152 une par une. Tu devrais signaler ce problème au gestionnaire de la plage 205.152, il doit avoir un proxy ouvert dans son réseau.