Re: over a 1,000,000,000 individual ips to block

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



 
Hi, 
 
1 million (ips and subnets) we are looking is actually  
the top 1 million spammers and open relays used.  
This list is automatically generated and currently  
stored in cdb files.  
 
Limited maximum connections and a simple accept established 
help, but we need more. Currently looking into modify 
the set patch to handle this large number. 
If not iptables then openbsd pf. 
 
We do get up to 100 smtp connections from a simple ip during peak times. 
 
> 	If you allow a simple IP to make a 100 smtp connections to your 
mail server 
 
> then you have other problems. Why you would allow any IP to make more 
then 10-15 
> connections is beyond me. Also .. if you set a error limit (example 
mine is 5) 
> when that limit is reached the smtp and tcp connection are dropped.  
 
> I am not saying that you should not block abusive IP's or network's at 
the 
 
>  
> Also what about ESTABLISHED connections ??? If you do not use a 
ESTABLISHED 
> state -j ACCEPT at the top ... then each IP would then in theory have 
to match 1 
> million rules every time it came in. 
>  
> I am sure there is a better answer then to create 1 million iptable 
rules.  
>  
> Michael.  
>  
>  
> On Mon, 28 Jun 2004 21:20:16 +0800 
> Feizhou <feizhou@xxxxxxxxxxxxx> wrote: 
>  
> > Michael Gale wrote: 
> > > Hello, 
> > >  
> > > 	Why don't you block networks ?? 
> > >  
> > > Firewall - SYN Cookie enabling ?  
> >  
> > What good is syn cookies against traffic that conform to tcp rules 
but  
> > are just too abusive? 
> > >  
> > > Mail servers - use RBL list - this list will contain networks of 
IP's that 
> > > belong to home users. So they do not need to connect directly to 
your mail 
> > > server. 
> >  
> > RBL does nothing against spammers who open 100 connections to each of  
> > your MXs and who run malware that do not understand,respect smtp 5xx.  
> > Dropping the connection means they keep coming at you. For these, 
there  
> > is nothing but a firewall that will keep them off your MXs. 
> > >  
> > > Web servers -- rate limiting ? block networks ? Better web server ? 
> > >  
> > > If you blocked networks ? The estimated max number of rules a 
packet might 
> > > have to match would be 254 ... plus the rest of your filtering for 
ports and 
> > > other needs. This could slow down network access because of all the 
rules to 
> > > check for each packet. 
> > >  
> > > If you are not using network addresses the list would become to 
long. 
> >  
> > I am sure CIDRs were part of the OP's mind since iptables takes both  
> > individial ips and CIDRs. He probably does have a mixture of over a  
> > million ips/cidrs he wants to block. 
> >  
> >  
> >  
> >  
>  
>  
> --  
> Michael Gale 
> Network Administrator 
> Utilitran Corporation 
>  
 


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux