Re: [PATCH 1/1] netfilter: xt_recent: Add optional mask option for xt_recent
From: Denys Fedoryshchenko
Date: Thu Apr 12 2012 - 05:08:46 EST
Hi Pablo
On 2012-04-12 02:14, Pablo Neira Ayuso wrote:
Hi Denys,
On Tue, Mar 06, 2012 at 01:24:44PM +0200, Denys Fedoryshchenko wrote:
Use case for this feature:
1)In some occasions if you need to allow,block,match specific
subnet.
2)I can use recent as a trigger when netfilter rule matches, with
mask 0.0.0.0
Example:
If you ping 8.8.8.8, after that you can't ping 2.2.2.10
Could you provide an useful example for this new feature?
I also think you can make this with hashlimit, that allows you to
set the network mask.
Yes, technically hashlimit can do a lot, but not everything. Especially
because xt_recent can be "fine-grained" in steps, depends on timeline of
event, and can be updated accordingly to time of reoccurred event. It is
generally not related to mask option, but mask gives power to block
subnets.
Why for example /24? Well, it is minimal mask for BGP announce :) It is
very often, that requesting ip has more ip's in same subnet
(load-balancing, or multiple ip's on dedicated server), and mask will be
highly useful for that, to reduce number of entries and to tighten weak
points (usually after ip blocked, they try from neighbor ip to check, if
destination just blocked single ip). Plus rttl and hitcount another
sweet things that are available in xt_recent, but aren't in hashlimit.
iptables -t mangle -N SIP
# If someone abuse our SIP, block him completely at least for 10
seconds, if he try again, update and block for new 120 seconds
iptables -t mangle -A SIP -m recent --name X --update --seconds 10
--mask 255.255.255.0 -j MARK --set-mark 0x1
# 120 - 600 seconds handle him over special relay (that will log his
query, but wont pass him to real SIP server)
iptables -t mangle -A SIP -m recent --name X --rcheck --seconds 600
--mask 255.255.255.0 -j MARK --set-mark 0x2
In this case i will log only invalid queries, but for example some DDoS
or scanners that flood servers by packets will be silently ignored.
Maybe if hitcount really bad, i will add them to ipset, and block
permanently, by -m set --add-set.
For me personally it is useful, because i have around 140 NAS servers,
and i give each of them /24 "gray" subnets, and in some cases i need to
handle bad users, that are changing dynamic ip and attacking from new ip
each time. I just block non-critical service for whole subnet then, till
technician on duty will solve issue completely. And sure if attack are
stopped, subnet will be unblocked "automagically".
Sure this feature not critical, or "a must", and if code are not good,
it is up to you, if it should be added or not.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/