TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

DDoS Protection With IPtables

50 点作者 _o-O-o_将近 6 年前

7 条评论

gravitas将近 6 年前
The author has one start out by implementing sysctl changes which have no relation to the subject matter at hand (printk, sysrq, panic, etc.). A number of comments on the article point out flaws and misconfigurations in the rulesets presented.
评论 #20077121 未加载
NightlyDev将近 6 年前
A lot of people seems to be thinking that it is pointless to use iptables to drop unwanted traffic in 2019. That is far from the truth.<p>Most attacks are usually small(&lt;10 Gbps) and effective iptables rules can go a long way, both against unwanted application traffic and packet floods.
评论 #20075989 未加载
sdeziel将近 6 年前
From the article: &quot;This drops all ICMP packets. ICMP is only used to ping a host to find out if it’s still alive.&quot;<p>Please stop this non-sense, there are too many ICMP blackholes already.
评论 #20077376 未加载
StreamBright将近 6 年前
This is not real DDoS protection since it does not deal with jamming the pipes. It is more of a resource exhaustion protection.
评论 #20075681 未加载
评论 #20075817 未加载
lossolo将近 6 年前
This can protect you from simple DoS attack by some script kiddie, not real DDoS attack. Just use CloudFlare or a provider that have active protections against DDoS attacks. Iptables will NOT help you with any real DDoS attack.
评论 #20075675 未加载
评论 #20075781 未加载
评论 #20075662 未加载
xmichael999将近 6 年前
Submissions like this one make me wish Hacker News had a downvote button...
评论 #20076533 未加载
评论 #20075564 未加载
评论 #20077270 未加载
eeeeeeeeeeeee将近 6 年前
I wouldn’t bother with iptables. I’ve done it before and it quickly gets overrun on any large scale attacks. Cloudflare on your front end will stop a lot of garbage and take the brunt of volumetric attacks, or use nginx&#x2F;varnish&#x2F;haproxy to rate limit and or block attackers before they reach your app.
评论 #20085700 未加载