Re: Dropping Malicious Packets in -t mangle

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Don, 2003-07-31 at 08:02, John A. Sullivan III via COM.BOX TEMA
wrote:
> Our idea was to filter malicious packets - spoofs, ping floods,
> suspicious tcp flags - in the mangle table.  We were concerned that we
> wanted to intercept these packets before they hit the connection
> tracking table for DNAT'd devices in case someone initiated a valid
> session and then tried to turn it foul.  We also noticed that the mangle
> table was the first all packets hit.
> 
> So we jumped various, possibly malicious, packets from -t mangle
> PREROUTING to -t mangle ProtectionMangle where they are examined for
> possible malice.  Are we being foolish or is this the best place to weed
> out possible problems?

I'm using that chain (mangle/PREROUTING) for exactly this kind of
stuff on all my servers.

Indeed, I sometime fantasize about writing a single netfilter match
which contains these matches, thus increasing performance. Probably,
I'd just extend unclean, which already is a kind of unified trash
matcher, and a good one.

So no, you're not being foolish, but not doing "something of
extraordinary creativity" either, I'm afraid ;-)

- Torsten



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux