On Sat, 1 Mar 2003 10:19:00 -0500, Joel Newkirk <netfilter@newkirk.us> wrote in message <200303011019.00158.netfilter@newkirk.us>: > On Saturday 01 March 2003 08:57 am, George Peverill wrote: > > I am running a small network (about 10-12 machines) with a linux > > gateway machine providing http/ssh/vpn(pptp)/firewalling/NAT > > Recently we've had someone that loves to hog bandwidth a tad (ie: > > downloading movies at 150-200k/s) while we slave away > > with the remaining 50k/s or so of bandwidth. I was wondering and I > > think its possible) if I could remedy this without resorting > > to compilicated QoS / CBQ crap. Basically is it possible to write a > > rule that'd say drop 25% or maybe 50% of all packets going to his > > machine from the gateway? (nasty yes agreed) > > > > -internal interface is eth0 (192.168.0.x) > > -external interface is eth1 > > > > Is it possible to do it based on his IP (which is known lets say > > 192.168.0.55 for example sake) or his MAC address which is known. > > Match in FORWARD chain (BEFORE any ACCEPT rules) with "-d > 192.168.0.55", and also possibly with "-p tcp --dport <portnumber>" > with the port that the traffic goes to, or "--sport" with the port the > traffic comes from. (this depends on the p2p app he's using) You can > use the limit match to specify a fixed number of packets in a > specified period of time, but not a percentage. You'd need to figure > out how many packets per second to set as a maximum. > > You may find that DROP doesn't help much, though, as it's likely his > p2p client will just keep requesting data, and the source will just > keep pumping it through as fast as it's able to. You might be better > served by Arnt Karlsen's favored approach - the TARPIT target from > patch-o-matic, or my favorite - whack him on the head with a keyboard. > > It also might help to use the similar dport/sport+sourceIP+limit > approach to restrict how many requests his p2p client can send out in > a given timeframe, as well as upload traffic. (many p2p clients > force, or strongly encourage [IE by limiting download to 4x upload] > allowing uploads from the client) > > > Any help would be greatly appreciated. I dunno how this can be done > > but im sure someone might be able to figure it out , would have to > > be done in the PREROUTING where SNAT is done wouldnt it ? > > No, this is filtering and should be done in the filter table, in this > case the FORWARD chain. > > j > > ..also, check out http://tldp.org/HOWTO/Adv-Routing-HOWTO/ -- ..med vennlig hilsen = with Kind Regards from Arnt... ;-) ...with a number of polar bear hunters in his ancestry... Scenarios always come in sets of three: best case, worst case, and just in case.