netfilter.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Eliezer Croitoru <eliezer@ngtech.co.il>
To: Francesco Morosinotto <francescomorosinotto@gmail.com>
Cc: netfilter@vger.kernel.org
Subject: Re: help needed preventing bruteforce behind a reverse proxy
Date: Wed, 02 Jul 2014 05:34:58 +0300	[thread overview]
Message-ID: <53B36FD2.70509@ngtech.co.il> (raw)
In-Reply-To: <CAMEq33fMwz-iufG+kVsrvdXwf7m9HZoE_0vF4Er5vZ8yyHk_9g@mail.gmail.com>

Indeed you got the point of the issue.

Just to let you know that squid can knock out many products out-there as 
a reverse proxy... and is very simple to setup(for me less then a minute)
But you can use haproxy which is very simple to implement or squid.
Nginx is nice and can perform nice as long as it doesn't supply cache, 
and also it's far more complicated to setup then squid and maybe also 
haproxy.
- Haproxy will handle more requests per second and is preferred by many 
admins for this task.
- Squid now(3.4.X and since 3.2) has SMP function which allows it to be 
even more then it was in the past.
With the right setup and settings it can be scaled on a 10GBps 
links.(not necessarily will benefit from all of it but faster then 
teamed\bonded 4 1GBps nics for sure)

If you want to try squid(I am the CentOS RPMs builder for squid) feel 
free to contact me and I can compile for you a squid.conf that will be 
good for your setup.

All The Bests,
Eliezer

On 07/01/2014 11:26 PM, Francesco Morosinotto wrote:
>
>     My suggestion is to implement the fail2ban rules on the reverse
>     proxy machine and not on the origin server.
>     If and only if you can't or doesn't want to, then use a PUSH throw
>     SSH or any other mean to blakclist the IP in the Reverse proxy iptables.
>
>
> So my problem will only be to pass the to-be-banned ip from server B
> (that can decide if an ip has to be banned or not) to server A (that can
> ban the ip using iptables)?
>
>
> cheers
>
> francesco


      parent reply	other threads:[~2014-07-02  2:34 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-07-01  8:03 help needed preventing bruteforce behind a reverse proxy Francesco Morosinotto
2014-07-01 15:35 ` William Taylor
2014-07-01 17:17 ` Eliezer Croitoru
2014-07-01 19:02   ` Paul Robert Marino
     [not found]   ` <CAMEq33fMwz-iufG+kVsrvdXwf7m9HZoE_0vF4Er5vZ8yyHk_9g@mail.gmail.com>
2014-07-02  2:34     ` Eliezer Croitoru [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=53B36FD2.70509@ngtech.co.il \
    --to=eliezer@ngtech.co.il \
    --cc=francescomorosinotto@gmail.com \
    --cc=netfilter@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).