06.12.2014, 17:57
What I will say is that the attackers are using modified packet data to accomplish all of this, and it is possible to block this using iptables. I can check the specific rule being used to do this, or at least describe the process on how to accomplish these rules later today.