The Arcive of Official vBulletin Modifications Site.It is not a VB3 engine, just a parsed copy! |
|
#11
|
|||
|
|||
![]()
OK fatal, I'm not a 100% about the type of this attack, and as I mentioned before, I dont have that much of an experience with linux, so let me describe the attack:
I have my forum in /vb/ directory, the ppl who were attacking me were attacking that specific directory only, I noticed that because when I felt that the server is slowing down I changed the folder's name through ssh, and it worked! .. so this told me that the attack is not on the network level, its mainly directed to www.sycoz.com/vb only . When the attack starts, whenever I try to open a page it just keeps loading and loading without any response from the server, once the attacks stops, the server goes back to its normal condition!. At one time I was talking with the attacker on yahoo chat, he told me that he's gonna attack in a few seconds, I opened my forum and it was completely normal, then he told me to refresh and when I did the server was not giving any response !, a dedicated server gets jammed by only one user and in a few seconds !!! Ok now I hope you guys have enough info and may be able to define the type of the attack, and btw, I could provide a link to the software they're using, please PM for it if your interested in ending this headache for me and for many other forum owners ![]() Thanks |
#12
|
|||
|
|||
![]()
In /etc/sysctl.conf you may want to try changing the following
net.ipv4.tcp_syncookies=1 net.ipv4.tcp_max_syn_backlog=1536 After that use the command sysctl -p to reload the config. I'm not 100% sure on this so you may want to remember the default values you are using and switch it back if it isn't working. |
#13
|
|||
|
|||
![]()
The best solution would probably be to install mod_evasive directly on your apache server..it allows you to set the max number of requests per second per client...anything above will only get an access denied message
|
#14
|
||||
|
||||
![]() Quote:
Until this mod reacted and blocked a client, the next proxy / bot is used already |
#15
|
|||
|
|||
![]()
Ok guys, you all seem to agree that this is a SYN flood attack, any other opinions?
And if it IS a SYN attack, could someone with the proper experience possibly give us a solution that he/she is 100% sure that it works? This topic has become more like a discussion, so lets put it together and offer a solution that would work for atleast 80% of the people that are having the same problem that Iam having. BTW, Lynne, can you give me the name of that script you guys used ? Waiting for more opinions guys ![]() |
#16
|
||||
|
||||
![]()
Hehe. It's called "scott.sh" Scott is the guy I hire to do stuff to our server and he wrote the code for us. It's just grabs the ip or anyone pounding the tracker, throws the ip into a file and then the file is input into the iptables.
|
#17
|
|||
|
|||
![]()
Lolz, I guess no one will ever gonna wanna use a script named scott anyway/joke
OK Lynne, I guess I'll have to finish my exams and start digging deep in this IPtables thing and linux generally, coz from now on I'm responsible of our server's management. Thanks anyway Lynne, big thanks to all the guys who participated here, and it would be very nice to have others replying with useful opinions ![]() |
#18
|
||||
|
||||
![]()
If this is not resolved yet I would be happy to help you out over instant messenger just PM me for it or check my profile.
Alot of hosts are on apache and do not specialize in these types of attacks, Ive had huge DDos attacks that bypass every firewall you install or any script you put in including reverse DNS etc. Just give me a shout if you run out of options.. |
#19
|
|||
|
|||
![]()
Well Shazz, thats very nice of you, I added you on yahoo chat and will be talking to you when u get online, thanks in advance
![]() btw ppl, I we ( me & Shazz ) could figure out a solution that acualy works than I'll be posting some kind of a HOWTO here about it, just to help other site owners get through this kind of attacks in the future ![]() |
#20
|
|||
|
|||
![]() Quote:
Quote:
![]() |
![]() |
|
|
X vBulletin 3.8.12 by vBS Debug Information | |
---|---|
|
|
![]() |
|
Template Usage:
Phrase Groups Available:
|
Included Files:
Hooks Called:
|