Wed Sep 05, 2007 9:12 pm
Is it a ddos attack participant ? what type of ICMP ?
You can use firewall filter to drop / limit the number of ICMP that they are using. If you drop 1 out of 5 packets or so it will probably be less useful and they will stop. If its straight abusive icmp i would just drop it completely. use a good icmp firewall chain to stop stuff like that.
jump to the icmp chain from your input and forward chains:
add chain=ICMP action=accept protocol=icmp icmp-options=8:0-255 limit=20,20 \
comment="8:0 and limit for 5pac/s \(Echo - No Code\)" disabled=no
add chain=ICMP action=accept protocol=icmp icmp-options=3:3 limit=30,5 \
comment="3:3 and limit for 5pac/s \(Port Unreachable\)" disabled=no
add chain=ICMP action=accept protocol=icmp icmp-options=11:0 limit=50,20 \
comment="11:0 and limit for 5pac/s \(TTL Exceeded\)" disabled=no
add chain=ICMP action=accept protocol=icmp icmp-options=0:0-255 limit=20,20 \
comment="0:0 and limit for 5pac/s \(Echo Reply\)" disabled=no
add chain=ICMP action=accept protocol=icmp icmp-options=3:0 limit=5,5 \
comment="3:0 and limit for 5pac/s \(Net Unreachable\)" disabled=no
add chain=ICMP action=accept protocol=icmp icmp-options=3:1 limit=5,5 \
comment="3:1 and limit for 5pac/s \(Host Unreachable\)" disabled=no
add chain=ICMP action=accept protocol=icmp icmp-options=3:4 limit=5,5 \
comment="3:4 and limit for 5pac/s \(Frag Not Needed\)" disabled=no
add chain=ICMP action=accept protocol=icmp icmp-options=3:13 limit=5,5 \
comment="3:13 and limit for 5pac/s" disabled=no
add chain=ICMP action=accept protocol=icmp icmp-options=3:10 limit=5,5 \
comment="3:10 and limit for 5pac/s" disabled=no
add chain=ICMP action=log protocol=icmp limit=1,2 log-prefix="" comment="log \
it" disabled=no
add chain=ICMP action=drop protocol=icmp comment="Drop everything else" \
disabled=no
you may have to adjust your limits depending on the size of your network and the type of traffic you expect. this is from a cable modem network so the limits might be a little low.
Sam