Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
How can I create something like ProxyShield?
I don't know. Maybe you could feed us some info on what ProxyShield is so we don't have to read marketoid spanglish?
Hard to say, it looks like you set the dns for your site to an IP on the proxy server, and the proxy its a linux server running apache2 and it does Multi-Gig Aggregation, flood Mitigation, Packet Inspection, and Out-of-state filtering, and then if the traffic is good it sends the traffic to the actual web server, I am guess in it uses IPtables and something else.
Since it says "Multi-Gig Aggregation" Im assuming the proxy server has at least 2 Gigabit nic cards with 1Gbps connections to the core router.
Well, I'm no network architect, and apart from obvious things like their multiple fat pipe infrastructure I think you could mimic it partially like this: I'net cloud->[router->firewall->pkt+proto filter]->[reverse proxy]->[backend]. Expanding your setup adding a loadbalancer, multiple proxies, separate NIDS box, etc, etc only is a money thing... BTW, AFAIK xDoS attacks aren't stoppable on any single server. You still need cooperation from an upstream provider to either limit access or shut down the pipe in the worst case scenario.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.