All of lore.kernel.org
 help / color / mirror / Atom feed
* over a 1,000,000,000 individual ips to block
@ 2004-06-24 14:57 Timothy Webster
  2004-06-28 12:45 ` Michael Gale
  0 siblings, 1 reply; 10+ messages in thread
From: Timothy Webster @ 2004-06-24 14:57 UTC (permalink / raw)
  To: netfilter, netfilter-devel

I have a need to block 1 -> 2 million ips. 
This edge firewall will be blocking dos attackers, spammers
from hitting our proxys, and mail/web servers.
I also need to be able to reload the 1 -> 2 million blocked 
ips from time to time as they change. 
But this list is not changing continuously.

Thoughts how to do this?
What would you recommend for a hardware?
The iptables set patch, what else?


I need to come of with a plan so I can begin testing for
deployment.

Thanks,

-Tim


^ permalink raw reply	[flat|nested] 10+ messages in thread
* Re: over a 1,000,000,000 individual ips to block
@ 2004-06-29 11:04 Timothy Webster
  2004-06-29 11:43 ` Feizhou
  0 siblings, 1 reply; 10+ messages in thread
From: Timothy Webster @ 2004-06-29 11:04 UTC (permalink / raw)
  To: Michael Gale, Feizhou, netfilter

 
Hi, 
 
1 million (ips and subnets) we are looking is actually  
the top 1 million spammers and open relays used.  
This list is automatically generated and currently  
stored in cdb files.  
 
Limited maximum connections and a simple accept established 
help, but we need more. Currently looking into modify 
the set patch to handle this large number. 
If not iptables then openbsd pf. 
 
We do get up to 100 smtp connections from a simple ip during peak times. 
 
> 	If you allow a simple IP to make a 100 smtp connections to your 
mail server 
 
> then you have other problems. Why you would allow any IP to make more 
then 10-15 
> connections is beyond me. Also .. if you set a error limit (example 
mine is 5) 
> when that limit is reached the smtp and tcp connection are dropped.  
 
> I am not saying that you should not block abusive IP's or network's at 
the 
 
>  
> Also what about ESTABLISHED connections ??? If you do not use a 
ESTABLISHED 
> state -j ACCEPT at the top ... then each IP would then in theory have 
to match 1 
> million rules every time it came in. 
>  
> I am sure there is a better answer then to create 1 million iptable 
rules.  
>  
> Michael.  
>  
>  
> On Mon, 28 Jun 2004 21:20:16 +0800 
> Feizhou <feizhou@linuxmail.org> wrote: 
>  
> > Michael Gale wrote: 
> > > Hello, 
> > >  
> > > 	Why don't you block networks ?? 
> > >  
> > > Firewall - SYN Cookie enabling ?  
> >  
> > What good is syn cookies against traffic that conform to tcp rules 
but  
> > are just too abusive? 
> > >  
> > > Mail servers - use RBL list - this list will contain networks of 
IP's that 
> > > belong to home users. So they do not need to connect directly to 
your mail 
> > > server. 
> >  
> > RBL does nothing against spammers who open 100 connections to each of  
> > your MXs and who run malware that do not understand,respect smtp 5xx.  
> > Dropping the connection means they keep coming at you. For these, 
there  
> > is nothing but a firewall that will keep them off your MXs. 
> > >  
> > > Web servers -- rate limiting ? block networks ? Better web server ? 
> > >  
> > > If you blocked networks ? The estimated max number of rules a 
packet might 
> > > have to match would be 254 ... plus the rest of your filtering for 
ports and 
> > > other needs. This could slow down network access because of all the 
rules to 
> > > check for each packet. 
> > >  
> > > If you are not using network addresses the list would become to 
long. 
> >  
> > I am sure CIDRs were part of the OP's mind since iptables takes both  
> > individial ips and CIDRs. He probably does have a mixture of over a  
> > million ips/cidrs he wants to block. 
> >  
> >  
> >  
> >  
>  
>  
> --  
> Michael Gale 
> Network Administrator 
> Utilitran Corporation 
>  
 


^ permalink raw reply	[flat|nested] 10+ messages in thread

end of thread, other threads:[~2004-06-29 11:43 UTC | newest]

Thread overview: 10+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2004-06-24 14:57 over a 1,000,000,000 individual ips to block Timothy Webster
2004-06-28 12:45 ` Michael Gale
2004-06-28 13:04   ` Alex Sirbu
2004-06-28 13:36     ` Feizhou
2004-06-28 13:52       ` Alex Sirbu
2004-06-28 14:14         ` Feizhou
2004-06-28 13:20   ` Feizhou
2004-06-28 16:31     ` Michael Gale
  -- strict thread matches above, loose matches on Subject: below --
2004-06-29 11:04 Timothy Webster
2004-06-29 11:43 ` Feizhou

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.