Re: iptables based appliances - ipset

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



hi neal

> On Sun, 7 Jun 2015 08:04:40 -0700 (PDT)
....
> > even if the src IP# might be spoof'd, you, i still do NOT want those
> > incoming DDoS attacks coming in at 1,000 or 10,000 packets per second
> 
> Yes, 1000 rules is a little overboard.

and if there's 10,000 iptables rules, it's galacticly overboard ?

	- it was also a test to see if iptables would fail
	and it didnt seem to break iptables

> Have you tried ipset? Last I knew, it becomes more efficient than
> individual rules when there are more than 16 IPs to check.

ipset is on the todo list ... but since most of the heavy DDoS attackers,
5,000 or ddos packets per hour, that i see are using just 1 ip# out of 
thier class-C, i thought ipset might not work as good since there's
no "classC" to tarpit ... 

i'd assume the script kiddies are the ones using the zombie hosts at 
*.11 *.12 *.13 *.14 doing silly things like portscans

my other iptables todo would be to AutoExpire the DDoS attackers 
to minimize the list of active ddos attackers  ... manually deleting
the attackers that went away is for the birds :-)

	iptables -N AutoExpire
	iptables -p tcp -A AutoExpire attacker0001
	iptables -p tcp -A AutoExpire attacker0002
	iptables -p tcp -A AutoExpire attacker0003
	iptables -p tcp -A AutoExpire attacker2000	# 2,000 ddos attackers
	...
	# tarpit if still attacking within 24hrs
	iptables -p tcp ... -m recent --name AutoExpire --rcheck --seconds 86400  -j TARPIT
	iptables -p tcp ... -m recent --name AutoExpire --remove
	iptables -p tcp ... -m recent --name AutoExpire --set  -j TARPIT 

one day, i will need to sit down figure out the --remove syntax 
for 5,000 DDoS attackers

thanx
alvin
IPtables-BlackList.net
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux