I need some help, my game server has been under fire with DoS attacks for 2 days now. Bandwidth attacks are no problem since I host with OVH and they are filtered out but my game server ports are being attacked which times out the servers and disconnects all players.
So at first it was easy, he attacked with packets from all the same length, 1062.
444 0.017859 159.208.182.160 192.95.55.2 UDP 1062 Source port: 53407 Destination port: 27016
445 0.017902 14.87.205.89 192.95.55.2 UDP 1062 Source port: 22286 Destination port: 27016
446 0.017907 68.191.26.190 192.95.55.2 UDP 1062 Source port: 48964 Destination port: 27016
447 0.017992 201.50.53.136 192.95.55.2 UDP 1062 Source port: 13001 Destination port: 27016
448 0.017993 58.15.28.176 192.95.55.2 UDP 1062 Source port: senip Destination port: 27016
So I just did a:
iptables -A INPUT -p udp --dport 27016 -m length --length 1062 -j DROP
Which worked, my servers suddenly came back to life again. This was like 1000 - 4000 KB/s of traffic.
Next thing you know, he starts sending 12 MB/s traffic, which I should be able to handle since I'm on gigabit and which I did, because only the attacked server went down (there are 4 servers running on 4 different IP addresses on the same server and the others were fine).
I ran tcpdump again, and ame thing. All attacks with length 1062 which I blocked earlier? So I'm kinda stuck here and don't know what to do.
Can someone please take a look at my tcpdump file and tell me what I'm doing wrong and how I can block off this attack (or can't)? I would really appriciate it!
I have a hard time reading it with wireshark, I've been trying to block packets with length, hex code etc but all not successful.
http://www.mediafire.com/download/8xe7cvx33dlgwxx/ddos2.tar.gz
Thanks!
Oh one more thing, during the attack my dmesg outputs this:
[35126.217197] nf_conntrack: table full, dropping packet
[35144.702662] nf_conntrack: table full, dropping packet
[35147.513124] nf_conntrack: table full, dropping packet
I already tried stuff like sysctl -w net.netfilter.nf_conntrack_max=524280 but that didn't seem to make any difference.
Thanks.