Re: banning bot ips with ipset

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi there,

On Tue, 25 Nov 2008, Nigel Heron wrote:

> We're being attacked by a botnet ... started dropping them in
> iptables, once we got to ~1700 banned ips the server stopped nat'ing
> completely (not sure why..)

It probably just ran out of steam.  The performance of iptables with
thousands of rules can be poor if you don't structure them carefully.

> Is ipset stable enough to be deployed on live environments?

I've been using it for years with absolutely zero problems.

> iphash seems like the best set type for us, how many
> ips can the set handle before there's a noticeable slowdown?

I currently have about 50,000 ipset (iphash) rules on modest hardware,
with no noticeable performance impact.  There's a good report here:

http://people.netfilter.org/kadlec/nftest.pdf

One of the authors also wrote ipset.  He's on this list.

> obviously, we don't expect ipset to help us with the syn flood, at
> ~30Mb/s of syn traffic, syn cookies aren't helping either, is there
> a syn-proxy implementation for linux?

Sorry, never looked at it, but a quick Google for /"syn proxy" linux/
gave me over 1,000 hits.

--

73,
Ged.
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux