[lug] IP Tables

Nate Duehr nate at natetech.com
Sat Sep 22 17:38:06 MDT 2007


Kevin Fenzi wrote:

> reject tells it: "sorry, rejected". It could of course keep trying
> anyhow, but any well behaved app would stop trying. 

And since most firewalls are protecting against badly behaved people and 
apps... DROP is almost always more appropriate.  :-)

In a REJECT, your machine HAS to respond.  This can be used as an 
amplifier for a DDoS -- assuming that your upstream and downstream 
speeds to the Net are the same (they're usually not anymore, of course), 
then the attacker can both fill your incoming and outgoing bandwidth up 
at the same time with one packet stream.

With DROP, they can only fill your incoming pipe.  Your machine never 
replies.

Additionally *if* your ISP were to allow a spoofed source address to 
make it to your machine, the REJECT's could be going to a third-party 
machine who'd follow the trail back to you.

With DROP, you can't be used in that way.

(And while it's rare anymore for ISP's to route anything that's not in 
their address ranges, some might... and spoofed addresses could reach 
your box.)

For most folks, a home connection is slow enough that any serious 
attacker attempting a DDoS on you is going to crush your bandwidth, but 
using you as a DDoS amplifier by messing with where your REJECT's go, is 
one reason not to use REJECT, and to just DROP it if you don't want it.

REJECT is from the days when the Internet was still a polite place with 
reasonable people.

That's my opinion anyway...

Nate



More information about the LUG mailing list