You are viewing a single comment's thread.

view the rest of the comments →

10794596? ago

How about block the entire countries until it's sorted out? or at least the subnet? Like I said the best method to prevent such attack is installing a flood protection, and limit the number of concurrent connections per IP of a port . Use CSF firewall and enable flood protection to 443 port, and redirect traffic coming to 80 to 443. Also you could move to OVH. Their DDOS protection can suck large attacks with ease, and it's also completely for free.

In csf.conf file you can add this line. This limits number of concurrent connections to 8 of port 443. Nowadays a browser like Chrome allows maximum 8 concurrent connections per host, so if there are multiple subdomains/domains then each one doubles this value. The second one limits the connections per time based. 20 connections within 6 seconds to 443/TCP port per IP. I am not sure about Windows host, but still you could proxy the traffic. Use a Linux Nginx server in front of the Windows host, and filter the traffic. Nginx is super fast, and it with combination of CSF you could relieve this DDOS attack somewhat. If it still doesn't work, get a OVH host their bandwidth is unlimited, and use it as a proxy server in front of your actual server. In OVH host install nginx and CSF as well to make it more effective. And finally make sure to block all the ports that are not used.

CONNLIMIT = "443;8" PORTFLOOD = "443;tcp;20;6"