This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
networking:router:mikrotik_under_attack [2014/06/03 15:13] gcooper |
networking:router:mikrotik_under_attack [2014/06/03 16:08] (current) gcooper |
||
---|---|---|---|
Line 1: | Line 1: | ||
====== So Your Mikrotik Firewall is Under Attack ====== | ====== So Your Mikrotik Firewall is Under Attack ====== | ||
- | |||
- | |||
FIXME Unfinished and untested. | FIXME Unfinished and untested. | ||
Line 12: | Line 10: | ||
:!: Consider disabling or deleting these rules after the attacks have subsided to keep from polluting your firewall rule set. | :!: Consider disabling or deleting these rules after the attacks have subsided to keep from polluting your firewall rule set. | ||
+ | |||
+ | ===== Port-Based Solution (may not be ideal) ===== | ||
==== Botnet - UDP Port 30837 ==== | ==== Botnet - UDP Port 30837 ==== | ||
Line 50: | Line 50: | ||
</ | </ | ||
- | ===== Sample Mikrotik DDoS Rules ===== | + | ===== Detection Based Solution |
http:// | http:// | ||
http:// | http:// | ||
+ | |||
+ | :!: This sample rule set is on the '' | ||
:!: This rule set uses '' | :!: This rule set uses '' | ||
+ | |||
+ | :!: You can also easily exclude (whitelist) certain hosts. | ||
+ | |||
+ | This example dynamically creates two address lists: attackers ('' | ||
< | < | ||
/ip firewall filter | /ip firewall filter | ||
- | | + | |
- | disabled=no | + | |
- | | + | comment=" |
- | dst-limit=32,32, | + | |
- | add action=add-dst-to-address-list address-list=ddos-target address-list-timeout=\ | + | add chain=detect-ddos action=return |
- | 1w chain=detect-ddos | + | comment=" |
- | add action=add-src-to-address-list address-list=ddos-source address-list-timeout=\ | + | |
- | 1w chain=detect-ddos | + | add chain=detect-ddos |
- | add action=drop | + | comment=" |
- | disabled=no | + | |
+ | add chain=detect-ddos | ||
+ | comment=" | ||
+ | | ||
+ | add chain=forward | ||
+ | | ||
</ | </ | ||
+ | **Q:** Is there way to make the rule less sensitive? When I browse to my web server, Firefox hangs and retries too many times and I'm flagged as a '' | ||
+ | **A:** '' |