添加了
sysctl -w net.ipv4.tcp_synack_retries=3
sysctl -w net.ipv4.tcp_syn_retries=3
还是不停收到
listening on eth1, link-type EN10MB (Ethernet), capture size 96 bytes
22:05:46.348446 IP 192.168.0.28.twsdss > 192.168.0.24.ssh: S 1589662453:1589662453(0) win 512
22:05:47.348336 IP 192.168.0.28.gilatskysurfer > 192.168.0.24.ssh: S 477879771:477879771(0) win 512
22:05:48.349337 IP 192.168.0.28.broker_service > 192.168.0.24.ssh: S 2048042890:2048042890(0) win 512
22:05:49.350343 IP 192.168.0.28.nati-dstp > 192.168.0.24.ssh: S 1105083605:1105083605(0) win 512
22:05:50.351351 IP 192.168.0.28.notify_srvr > 192.168.0.24.ssh: S 1259519026:1259519026(0) win 512
...
有专门的设备和策略来防范Doos攻击,这么简单粗暴的攻击,数据量大的话就跟发洪水似的........
运营商层面有流量清洗设备,但是效果不是很理想。