It’s only got a DMZ mode where I can configure it to forward all incoming traffic to my own router running behind it, but even in that mode it still has to NAT all the packets. IPv6 traffic seems to get forwarded along without much (if any) additional processing, but for hosting stuff publicly I would obviously need to expose IPv4 as well.
- 0 Posts
- 9 Comments
Even if the SYN packets were being ignored, the connection would still be unusable if there’s enough incoming traffic for most legitimate packets to get dropped. And as mentioned in other comments, the router in question is a shitty ISP router which can’t be replaced (although I do have a much fancier router with OpenWRT running behind that).
That doesn’t help against a SYN flood.
A shitty ISP-supplied modem/router which I have to use :|
I spent multiple days getting SYN flooded to the point my router would crash and reboot over and over, and it stopped the moment I set up cloudflare and asked my ISP to change my IP. This was the instance which pushed me over the edge, but there had been smaller attacks lasting a few minutes each for years leading up to this.
It’s the reason I set up cloudflare in the first place, so yeah. I was getting SYN flood-ed to the point that my router would just crash almost immediately, and after rebooting it the attack would resume after a minute or two.
if you can provide me a better way to keep my homelab from getting DDoSed every five minutes then by all means, please share it
I think they mean that the curve is high on the edges and dips in the middle.
There are better ISPs around, but my parents (who are the ones paying for it) don’t want to switch providers because… reasons? At any rate it isn’t happening any time soon, but once I move out I’ll finally be able to switch to Init7 and be done with it all :)