Re: ban traffic per country

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Thank Noel.

I got around to doing some more reading about ipset and added your rules.

Looking at counters and having done some testing they are not getting
applied. I say this based on the counters (ie)

https://dpaste.de/9QG0#L21

Should the rules be at the top?

Thanks again

-Al


On Mon, Oct 6, 2014 at 12:20 AM, Noel Kuntze <noel@xxxxxxxxxxxxxxxxx> wrote:
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>
> Hello Al,
>
> I'm going to break it down for you.
>
> The reason for storing it as a hash is, that that hash:net is the only storage type that only requires a subnet.
> Every other type requires either more arguments (hash:net,net, hash:net,port) or doesn't support the :net data type.
>
> You need family inet, because you're working IPv4 addresses. If you want to work with ipv6 addresses, you need to use
> family inet6.
>
> hashsize and maxelem aren't really needed, as I just gave you the default values for those.
>
> If your distro doesn't come with a default ipset.conf file, you should create one.
> The file "ipset.conf" just contains the ipset structure with the members.
> If you created an ipset using the "ipset" tool, you can store it using "ipset -f <pathToTheSaveFile> save".
> To load the ipset before you load the iptables rules, you also need create a service with the correct dependencies.
>
>
> Mit freundlichen Grüßen/Regards,
> Noel Kuntze
>
> GPG Key ID: 0x63EC6658
> Fingerprint: 23CA BB60 2146 05E7 7278 6592 3839 298F 63EC 6658
>
> Am 05.10.2014 um 04:56 schrieb Al Grant:
>>  Hi Noel,
>>
>> So I have started to read manpages on ipset. Its left me with a few questions.
>>
>> Could you break the command down into pieces?
>>
>> I get "ipset create new-Zealand" but why store it as a hash?
>>
>> What datatypes doesn't net include for example?
>>
>> The explanation in the manual for the rest " inet hashsize 1024
>> maxelem 65535" I didn't understand either.
>>
>> It would be nice to understand what I am doing rather than blindly
>> copying your commands - where's the learning in that!
>>
>> The iptables rule I am ok with.
>>
>> Finally you talk about ipset.conf ? I have installed ipset - but a
>> "find / -name ipset.conf" didn't find anything so Im not sure that
>> file exists anywhere on my system (RedHat).
>>
>> What should I be adding to ipset.conf when I find it.
>>
>> Thanks in advance,
>>
>> -Al
>>
>>
>>
>>
>> On Fri, Oct 3, 2014 at 6:51 AM, Noel Kuntze <noel@xxxxxxxxxxxxxxxxx> wrote:
>>>
>> Hello Al,
>>
>> Please keep it on the list.
>> An ipset is basicly external storage in kernel space. It can contain a couple of layer
>> three and four information, like IP addresses or ports. You can match on said
>> characteristica with the "set" iptables match module.
>> You need to load the ipset before you load the rules, otherwise you can't
>> load them.
>> Example rules and ipset:
>>
>> Rule: -A INPUT -m set ! --match-set new-zealand src -j DROP
>>
>> ipset:
>> create new-zealand hash:net family inet hashsize 1024 maxelem 65535
>> add new-zealand 10.0.0.0/8
>> add new-zealand 172.16.0.0/12
>>
>> The rule matches on all traffic, that does not come from an IP that is contained in
>> any of the networks contained in the set "new-zealand".
>> I don't know what distribution you use, so I can't tell you where it's supposed to go
>> on your host. On Arch Linux, you have /etc/ipset.conf.
>>
>> Mit freundlichen Grüßen/Regards,
>> Noel Kuntze
>>
>> GPG Key ID: 0x63EC6658
>> Fingerprint: 23CA BB60 2146 05E7 7278 6592 3839 298F 63EC 6658
>>
>> Am 02.10.2014 um 19:45 schrieb Al Grant:
>> >>> Thanks for the fast reply Noel.
>> >>>
>> >>> Im not particularly good with iptables or ipset. Would you mind
>> >>> providing a little more detail?
>> >>>
>> >>> Thanks in advance,
>> >>>
>> >>> -Al
>> >>>
>> >>>
>> >>> On Fri, Oct 3, 2014 at 6:35 AM, Noel Kuntze <noel@xxxxxxxxxxxxxxxxx> wrote:
>> >>>>
>> >>> Hello Al,
>> >>>
>> >>> Yes, that is possible. Get the list of subnets that is assigned to the ISPs in
>> >>> New Zealand and put it into an ipset. Then match on said ipset with the "set"
>> >>> match module.
>> >>>
>> >>> Mit freundlichen Grüßen/Regards,
>> >>> Noel Kuntze
>> >>>
>> >>> GPG Key ID: 0x63EC6658
>> >>> Fingerprint: 23CA BB60 2146 05E7 7278 6592 3839 298F 63EC 6658
>> >>>
>> >>> Am 02.10.2014 um 19:27 schrieb Al Grant:
>> >>>>>> Hi All,
>> >>>>>>
>> >>>>>> I have a Amazon instance running asterisk. I think it also has fail2ban running.
>> >>>>>>
>> >>>>>> I want to lock it down a little as I have opened up some ports for
>> >>>>>> asterisk to run.
>> >>>>>>
>> >>>>>> In essence no traffic should connect to it except from my country .nz
>> >>>>>>
>> >>>>>> Is there a way to do this? I see a few websites list some very long
>> >>>>>> lists of iptables per country.
>> >>>>>>
>> >>>>>> Cheers
>> >>>>>>
>> >>>>>> -Al
>> >>>>>>
>> >>>>>>
>> >>>
>> >>>>
>> >>>
>> >>>
>> >>>
>>
>>
>>>
>>
>>
>>
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v2
>
> iQIcBAEBCAAGBQJUMSmVAAoJEDg5KY9j7GZYIbMQAJvh8r/K5FQwRDmQocmR/+em
> r0pfykS5ti76+sj1yX1Rei5q1jBWmvkVRFwxNQP9ShPr9C/f9Kj0ivS9S/vgCXDT
> b/Tg+ykCYnutf5n2bM4oX3dby0+Pn0Q33yZws6QKT/YQIiOnvgitVIKhMpHuZCvm
> +GawpF/6iEz8uZ4z9Ib2Z9PABLrvHfpMC4Dt+EhOGqwCb3ZAYaCFAiB0rrTSWPVq
> daBRmpgMasKXUNo2fZSXkt9tGYifLHRpBagqiIkMBcMvh2TlQJK3jyIVrjd8DRWh
> DHVV+C7tID6OhayFivjz1jOoaynini/spJ7WIMbMI3udIN3XMxZt9ZtmrjOctKQI
> ge4C0mDcdUDvc9opbenzOO7k6ZcXC+wdYpQ5FAC9onxgajpOKsDiPcBzf6Xgrnc6
> 61aQcdc/py2aBol6zvYMOssa1a0gL8AqwGGkI6RRsLkD45sz7f7B2dPfSYqmTzEo
> CMOwusRFefHBNDIRDuMRLA5lYAyu8j48GxoGtppj0XF+Adcr58vcUU9dF7eSQsqS
> fhIzkk4DJaLq7LH4x9RQ05SP6ke2LRCMFPbh/zvBUQ+fLoJ5gTZveypZxN6mE3MR
> f7d2NQgBuxieZPCwr4yY2yGc+j+DURSooJv1+/Gb6zrxSbEWsAVQfoF5+vyT7rtX
> 1tpgxsf7get0hciX23Di
> =YyjO
> -----END PGP SIGNATURE-----
>
>



-- 
"Beat it punk!"
- Clint Eastwood
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux