Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    CHARGEN ddos attack

    Scheduled Pinned Locked Moved General pfSense Questions
    6 Posts 5 Posters 1.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • S
      sphillips
      last edited by

      i run a few gaming servers for fun with friends, lately ive getting some ddos attacks from some players that i banned, while searching about it, ive found a few websites that will let you ddos for free. (not sure posting the website here is acceptable)

      while testing some of the attacks the "CHARGEN" type of attack was the only one that i couldn't block it from within pfsense as a matter of fact this type of atack would work on ports that are not even open (works on any port) is this possible to block from within pfsense ?

      1 Reply Last reply Reply Quote 0
      • J
        JorgeOliveira
        last edited by

        As far as I know, and I just Google'd about the subject. CHARGEN is just another kind of UDP bandwidth based reflection/amplification attack. In this case, the attacker(s) overwhelm the bandwidth to cause denial-of-service.

        Unfortunately pfSense alone will not mitigate this. You need to contact your ISP and find if they can help you.

        My views have absolutely no warranty express or implied. Always do your own research.

        1 Reply Last reply Reply Quote 0
        • DerelictD
          Derelict LAYER 8 Netgate
          last edited by

          A firewall cannot stop "too much" traffic from arriving on your WAN. All it can do is block it when it arrives.

          Chattanooga, Tennessee, USA
          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
          Do Not Chat For Help! NO_WAN_EGRESS(TM)

          1 Reply Last reply Reply Quote 0
          • S
            sphillips
            last edited by

            as i thought …. i had called my isp as soon as i found out what kind of attack it was unfornatelly they will not provide support or dont know how to provide support all they will tell you is to reboot my router to change my ip (i acctually had kinda fight with the atendant after hearing that stupid "solution") anyways seems ill have to live with it.

            1 Reply Last reply Reply Quote 0
            • P
              pfBasic Banned
              last edited by

              I don't know anything about DDOS attacks so this may not be helpful at all (probably won't be as you've already had responses from experienced people), but I'll put it out there in hopes it helps you out.

              Could you use suricata and the Emerging Threats DDOS list to ban the attacking IPs?

              emerging-dos.rules
              

              this type of attack would work on ports that are not even open (works on any port)

              Again would some suricata rules that block IPs that hit your unused ports help?

              
              drop tcp $EXTERNAL_NET any -> any !$MY_PORT (msg:"The Golden Rule, TCP"; classtype:network-scan; sid:9000; rev:1;)
              drop udp $EXTERNAL_NET any -> any !$MY_PORT (msg:"The Golden Rule, UDP"; classtype:network-scan; sid:9001; rev:1;)
              
              

              Those rules will drop anything not on your network on any port going to any IP on any port you aren't using.

              You can modify/add variables if necessary in /usr/local/pkg/suricata/suricata_yaml_template.inc under the "vars:" section.
              You'll need to add the $MY_PORT variable there as a list of the ports you use.
              Syntax Example:

              
                # Holds the port group vars that would be passed in a Signature.
                port-groups:
                  {$port_vars}
                  MY_PORT: "[80, 443, 1024:65535]"
              
              

              Again, I know nothing about DDOS attacks so this may not work. If nothing else you could use the rules to build a list of offending IP's possibly to send to your ISP? Those two custom rules will in theory not generate any IP's that are "real" traffic (you might need to adjust variables to accommodate your servers? but I think they will work as is once you create $MY_PORT).

              Check the link"Suricata Persistent Blocked Hosts List How To" in my signature if you are rebooting/shutting down a lot and need a persistent list.

              You can also use the commands there to export your IP lists to file so you can send to your ISP.

              pfctl -T show -t snort2c | gzip > /usr/local/etc/snort2c.gz
              

              You might need to increase your Firewall Maximum Table Entries at System > Advanced > Firewall & NAT.

              1 Reply Last reply Reply Quote 0
              • ivorI
                ivor
                last edited by

                http://pfsensei.org/2015/04/02/a-cup-of-tea/

                Need help fast? Our support is available 24/7 https://www.netgate.com/support/

                1 Reply Last reply Reply Quote 0
                • First post
                  Last post
                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.