Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


Best way to protect your servers from DDoS without buying DDoS protection
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

Best way to protect your servers from DDoS without buying DDoS protection

AndreiAndrei Member
edited April 2015 in Help

Hey,

Just wanted to ask if anybody has any experiences or knowledge about this.

Many thanks,

Andrei

EDIT: Yes I know about Cloudflare

Comments

  • If your serving a website you can use a reverse proxy or a game server you can use a TCP proxy. As for L7 that's up to the application

  • vfusevfuse Member, Host Rep

    Depends on what kind of attack, but powerfull server and 10gbit uplink helps.

  • You can protect only from low speed layer 7 attacks... http flood etc

  • blackblack Member

    Turning off your server is the best way.

  • AmitzAmitz Member
    edited April 2015

    @black said:
    Turning off your server is the best way.

    Yeah - but - no - but... ;-)

    Thanked by 1Bochi
  • Me_BMe_B Member

    Cloudflare offer a good reverse proxy solution, that can help sustaining the load.

  • deployvmdeployvm Member, Host Rep

    You will have no chance of directly protecting your server for high bandwidth attacks (e.g. UDP based). You are limited by server's bandwidth speed.

    For SSYN/TCP attacks, you could do some kernel tweaks (e.g. syn cookies, no of tcp connections) and configure IPTables to reject some syn requests but requires much CPU processing power.

    For application layer attacks (Layer 7), this is dependent on how much server resources you have available. You could configure nginx (best option), use ddos deflate (use fork on github), limit the number of connections per IP and block bad/invalid requests/headers.

    All of this will only work for small attacks (some requests per second) and your webserver will not possibly be handle an attack of a hundred or thousands requests size.

    Your other option to get hardware-based DDoS mitigation and use that as a reverse proxy or tunnel to your unprotected server. Of course, this will add latency and cause some performance degradation (depending on filter location) but is the best solution where there is no direct protection.

  • rm_rm_ IPv6 Advocate, Veteran
    edited April 2015

    First of all, http://rhelblog.redhat.com/2014/04/11/mitigate-tcp-syn-flood-attacks-with-red-hat-enterprise-linux-7-beta/
    even the two commands they list in the beginning will already help a lot.
    After that you could consider deploying SYNPROXY either following the same article further, or this one: https://r00t-services.net/knowledgebase/14/Homemade-DDoS-Protection-Using-IPTables-SYNPROXY.html

    Thanked by 1howardsl2
  • @Me_B said:
    Cloudflare offer a good reverse proxy solution, that can help sustaining the load.

    The free one won't protect you,

    Thanked by 1k0nsl
  • k0nslk0nsl Member
    edited April 2015

    @TinyTunnel_Tom,

    This is what their representatives usually say when asked about it:

    Our goal is to never send traffic through directly, but in rare cases with Free and Pro customers, we do if it's likely to affect other customers. There's no specific number or set limit.

    With Business and Enterprise, there's no limit. We devote the resources necessary to block the attack regardless.

  • AlexBarakovAlexBarakov Patron Provider, Veteran

    The best free way is to keep the server unplugged from the network. 100% protection

  • use the ip 127.0.0.1

  • Use windows firewall

    Thanked by 1TinyTunnel_Tom
  • @rm_ said:
    First of all, http://rhelblog.redhat.com/2014/04/11/mitigate-tcp-syn-flood-attacks-with-red-hat-enterprise-linux-7-beta/
    even the two commands they list in the beginning will already help a lot.
    After that you could consider deploying SYNPROXY either following the same article further, or this one: https://r00t-services.net/knowledgebase/14/Homemade-DDoS-Protection-Using-IPTables-SYNPROXY.html

    At November 2014, we did try synproxy, and other methods from message above.

    And what i want to say? It's works very well.

    We did make gre tunnels from OVH servers to our game servers.

    Then we did enable AntiDDoS Pro + synproxy.

    If some of attack go though ovh anti-ddos, we can absorb this attack by our syn-proxy.

    This is very good solution, if mitigation mode from OVH not triggered, or attack not detected, but you are dieing under ddos.

    Thanked by 1rm_
Sign In or Register to comment.