RE: filtering by packet contents?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



i have a little question, how can i meansure if machine is slowdown
my network performance ? and how i can see cpu load of iptables  ?

-----Original Message-----
From: netfilter-admin@xxxxxxxxxxxxxxxxxxx
[mailto:netfilter-admin@xxxxxxxxxxxxxxxxxxx]On Behalf Of George Vieira
Sent: quarta-feira, 16 de julho de 2003 03:43
To: Daniel Chemko
Cc: cc; netfilter@xxxxxxxxxxxxxxxxxxx
Subject: RE: filtering by packet contents?


Yes this is true but what you can do is this...

Patch in the "string" module as well as the "iplimit" module

Add a rule for "iplimit" to block already registered IPsfor xx seconds.
Then add a rule for SYN connections with that --string to add it's source to
the iplimit table.

Usually the code red attacks aren't spoofed (from memory) and are just
trying to get in.. so after the first attempt, the second/third/fourth will
be automatically dropped and won't be looked at by --string since iplimit
blocks before it... get it? this should not stress the CPU as much I don't
think...

dunno if that made sense or would fully work 100% but it's an idea I had for
other types of problems.. PSD is another one..

Thanks,
____________________________________________
George Vieira
Systems Manager
georgev@xxxxxxxxxxxxxxxxxxxxxx

Citadel Computer Systems Pty Ltd
http://www.citadelcomputer.com.au

-----Original Message-----
From: Daniel Chemko [mailto:dchemko@xxxxxxxxxx]
Sent: Wednesday, July 16, 2003 4:23 PM
To: George Vieira
Cc: cc; netfilter@xxxxxxxxxxxxxxxxxxx
Subject: Re: filtering by packet contents?


George Vieira wrote:

>You can you use the p-o-m patch for the string module "-m string --string
pattern"
>
>this works and can be used for some funky stuff too like redirecting 1
virtual host on a server to another server which is very handy when a
particular virtual host goes down...
>
>
>

Just keep in mind that the string patch is VERY heavy on CPU depending
on how much traffic passes through the rule.




********Confidencialidade do Correio do Eletrônico***************
Informações confidenciais podem estar contidas nesta mensagem. Se você não
se encontra na lista de destinatários ou não é o remetente da mesma, você
não deve copiar ou enviar esta mensagem para ninguém. Neste caso, você deve
destruir e notificar o remetente da mesma. A empresa considera opiniões,
conclusões e outras informações que não se relacionam com o negócio oficial
da corporação de responsabilidade do usuário do serviço.




[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux