Over the past year or so I've noticed low level dos attacks against my webserver running on my VDS. The majority of the attacks appear to be posts to http://www.silicateillusion.org/xmlrpc.php. I was wondering if there was a way to filter out all requests to xmlrpc.php using the firewall.
I don't think it's possible as from what I've read the url is HTTP level, and not TCP/IP Level. I noticed it was visible in one of the packets, but I'm guessing that is just a get request.
Code: Select all
08:02:52.196218 IP (tos 0x28, ttl 49, id 0, offset 0, flags [DF], proto TCP (6), length 40)
    185.130.5.180.49313 > 74.91.120.231.80: Flags [R], cksum 0x1477 (correct), seq 3351416892, win 0, payload 0
	0x0000:  4528 0028 0000 4000 3106 c72f b982 05b4  E(.(..@.1../....
	0x0010:  4a5b 78e7 c0a1 0050 c7c2 903c 0000 0000  J[x....P...<....
	0x0020:  5004 0000 1477 0000                      P....w..
08:02:52.196229 IP (tos 0x28, ttl 49, id 0, offset 0, flags [DF], proto TCP (6), length 40)
    185.130.5.180.49313 > 74.91.120.231.80: Flags [R], cksum 0x1477 (correct), seq 3351416892, win 0, payload 0
	0x0000:  4528 0028 0000 4000 3106 c72f b982 05b4  E(.(..@.1../....
	0x0010:  4a5b 78e7 c0a1 0050 c7c2 903c 0000 0000  J[x....P...<....
	0x0020:  5004 0000 1477 0000                      P....w..
    
    08:06:37.973330 IP (tos 0x28, ttl 50, id 32542, offset 0, flags [DF], proto TCP (6), length 60)
    185.130.5.180.51709 > 74.91.120.231.80: Flags [S], cksum 0xf781 (correct), seq 1771376060, win 14600, options [mss 1460,sackOK,TS val 3770380962 ecr 0,nop,wscale 7], payload 0
	0x0000:  4528 003c 7f1e 4000 3206 46fd b982 05b4  E(.<..@.2.F.....
	0x0010:  4a5b 78e7 c9fd 0050 6995 0dbc 0000 0000  J[x....Pi.......
	0x0020:  a002 3908 f781 0000 0204 05b4 0402 080a  ..9.............
	0x0030:  e0bb 72a2 0000 0000 0103 0307            ..r.........
    
    08:10:17.232397 IP (tos 0x0, ttl 49, id 6724, offset 0, flags [DF], proto TCP (6), length 60)
    185.130.5.180.50246 > 74.91.120.231.80: Flags [S], cksum 0x85eb (correct), seq 3303330122, win 14600, options [mss 1460,sackOK,TS val 3770600206 ecr 0,nop,wscale 7], payload 0
	0x0000:  4500 003c 1a44 4000 3106 acff b982 05b4  E..<.D@.1.......
	0x0010:  4a5b 78e7 c446 0050 c4e4 d14a 0000 0000  J[x..F.P...J....
	0x0020:  a002 3908 85eb 0000 0204 05b4 0402 080a  ..9.............
	0x0030:  e0be cb0e 0000 0000 0103 0307            ............
    
    08:10:17.362663 IP (tos 0x0, ttl 49, id 6726, offset 0, flags [DF], proto TCP (6), length 526)
    185.130.5.180.50246 > 74.91.120.231.80: Flags [P.], seq 1:475, ack 1, win 115, options [nop,nop,TS val 3770600336 ecr 51810377], length 474: HTTP, length: 474
	POST /xmlrpc.php HTTP/1.0
	Hos[!http]
	0x0000:  4500 020e 1a46 4000 3106 ab2b b982 05b4  E....F@.1..+....
	0x0010:  4a5b 78e7 c446 0050 c4e4 d14b 9488 f936  J[x..F.P...K...6
	0x0020:  8018 0073 4914 0000 0101 080a e0be cb90  ...sI...........
	0x0030:  0316 9049 504f 5354 202f 786d 6c72 7063  ...IPOST./xmlrpc
	0x0040:  2e70 6870 2048 5454 502f 312e 300d 0a48  .php.HTTP/1.0..H
	0x0050:  6f73

