Re: What's the best way to block these IP's?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Saturday 18 June 2005 11:46, Netfilter wrote:
> What's the best way to block these IP's?

I'm not sure what your question is. I see a few main possibilities
about which you might be asking. I'll address those.

> -A INPUT -p tcp -s 213.0.0.0/32 -i eth1 -j DROP
>
> or
>
> -A INPUT -p tcp -s 218.0.0.0 -i eth1 -j DROP

Maybe you don't understand CIDR notation, and thus don't know what
these do. A /32 netmask means "this IP only" in English. 32 bits of 
netmask is 255.255.255.255. Both forms are the same!

If you want to block all IP's starting with 213 or 218, those won't do 
it. You would need to use /8 or smaller. 218.0.0.0/8 is 218.0.0.0 
through 218.255.255.255; 218.0.0.0/7 is 218.0.0.0 through 
219.255.255.255. Rusty's Networking Concepts HOWTO might help.

Generally the best strategy for firewalling is to choose what to allow 
and let everything else hit a DROP or REJECT policy or rule. Here the 
Packet Filtering HOWTO has examples which might help. Note as well that 
all your examples are only limiting TCP traffic, and only if coming in 
your eth1 interface.

Furthermore there are common misunderstandings concerning the role of 
INPUT as opposed to FORWARD. If you're wanting to block traffic from or 
to NAT users, your INPUT rules will not do it. Again this is explained 
in the Packet Filtering HOWTO.

When I have common rules I want called from both INPUT and FORWARD, I 
use a new chain ...
# iptables -N Common
# iptables -vA Common -s 218.0.0.0/7 -j DROP
[ ... other rules as wanted ... ]
# iptables -vA INPUT -j Common
# iptables -vA FORWARD -j Common
You can of course limit the type of traffic sent to the chain with 
matches on the calling rule.

HTH, and if not you, HTH someone else.
-- 
    mail to this address is discarded unless "/dev/rob0"
    or "not-spam" is in Subject: header


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux