Skip to content
This repository has been archived by the owner on Jan 14, 2020. It is now read-only.

DDOS protection #3

Open
ambertch opened this issue Jun 20, 2018 · 2 comments
Open

DDOS protection #3

ambertch opened this issue Jun 20, 2018 · 2 comments
Assignees
Labels
enhancement New feature or request security

Comments

@ambertch
Copy link

ambertch commented Jun 20, 2018

Rate limiting of external requests or some other form of DOS/DDOS protection for IPFS gateways and full nodes

@ambertch ambertch added the enhancement New feature or request label Jun 20, 2018
@ambertch ambertch self-assigned this Jul 9, 2018
@ambertch
Copy link
Author

ambertch commented Jul 9, 2018

https://blog.cloudflare.com/meet-gatebot-a-bot-that-allows-us-to-sleep/

Techniques Cloudflare uses:

  • "scattering": moving a domain name between IP addresses (attacker has to update IP)
  • dropping packets using IPTables (linux firewall): max number of connections, max number of packets can configured. they report the linux kernel can handle up to 1M packets/sec, and with kernel bypass packets can be handled at the NIC itself.
  • layer 7: disabling HTTP Keep-alives forces an attacker to re-establish the TCP connection per packet send, which rate limits them. Rate limits can also be put in place that will present a javascript captcha.

According to Amazon, AWS has a product called Shield, of which the standard version is automatically enabled for customers using DNS, load balancing, or CDN services (Route53, ELB, Cloudfront) https://aws.amazon.com/shield/tiers/ - the protection the free tier provides looks to be similar to what Cloudflare describes as the on-machine measures (with an advanced tier providing routing and DNS level protection)

@franckc
Copy link

franckc commented Jul 10, 2018

Couple thoughts:

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
enhancement New feature or request security
Projects
None yet
Development

No branches or pull requests

3 participants