Hello,
I compiled nDPI-nefilter patch and it works fine. What I want is to
shape the p2p traffic in my network. For this purpose i just implemented
the nDPI-netfilter patch as two different ways for testing
iptables -t mangle -A POSTROUTING -o XXX -m ndpi --bittorrent -j
CONNMARK --set-mark 1
iptables -t mangle -A POSTROUTING -m connmark --mark 1 -j CLASSIFY
--set-class 0001:0010
or
iptables -t mangle -A POSTROUTING -m ndpi --bittorrent -j CLASSIFY
--set-class 0001:0010
So which one is more suitable for use? I don't know if this patch
inspects connections (marks connection) or every single packet (marks
every single) for a match.
Regards,
Lutfi
On 11/02/2012 12:56 AM, Ed W wrote:
On 01/11/2012 22:03, Andrew Beverley wrote:
On Sun, 2012-10-28 at 16:57 +0200, Eliezer Croitoru wrote:
I have to admit that I only had limited success with l7-filter,
although
it no longer appears to be maintained anyway.
What would you want to achieve from a using l7 iptables?
filtering? scheduling?
At the time I was using it to do traffic shaping, to prevent p2p
applications overloading a network with low bandwidth internet
connection. The problem was that it only needed one p2p application to
not be identified for the network to be overloaded. So in the end I took
a rather rudimentary approach and just identified any client making lots
of connections to ports above 1024:
http://www.andybev.com/index.php/Fair_traffic_shaping_an_ADSL_line_for_a_local_network_using_Linux
I think it's safe to assume that at least a determined attacker can
avoid these filters. Ideally you want them reasonably accurate for the
normal situation...
I guess you just invented an "L7 Filter" yourself... It's just as good a
match for certain requirements...!
Let me know if you measure this thing against your problem?
Cheers
Ed W
_______________________________________________
Ntop-dev mailing list
Ntop-dev@xxxxxxxxxxxxxxxxxxxx
http://listgateway.unipi.it/mailman/listinfo/ntop-dev
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html