* SpamHaus DROP list in Netfilter
@ 2008-12-16 14:27 Julien Vehent
[not found] ` <200812161604.37183.misch@multinet.de>
0 siblings, 1 reply; 4+ messages in thread
From: Julien Vehent @ 2008-12-16 14:27 UTC (permalink / raw)
To: netfilter
Hi All,
I was wondering how I could integrate the spamhaus drop list
(http://www.spamhaus.org/drop/drop.lasso) into my Netfilter rules.
The list is not too long, so I thought putting it directly into a new chain
would be doable without degrading too much the performances. Somebody also
told me to use a chains tree, but I wonder if this is necessary considering
the size of the list...
Has anybody done this before ?
Thanks,
Julien
--
www.linuxwall.info
^ permalink raw reply [flat|nested] 4+ messages in thread[parent not found: <200812161604.37183.misch@multinet.de>]
* Re: SpamHaus DROP list in Netfilter [not found] ` <200812161604.37183.misch@multinet.de> @ 2008-12-16 16:30 ` Julien Vehent 2008-12-16 17:55 ` Sven-Haegar Koch 0 siblings, 1 reply; 4+ messages in thread From: Julien Vehent @ 2008-12-16 16:30 UTC (permalink / raw) To: Michael Schwartzkopff; +Cc: netfilter On Tue, 16 Dec 2008 16:04:36 +0100, Michael Schwartzkopff <misch@multinet.de> wrote: > Am Dienstag, 16. Dezember 2008 15:27 schrieben Sie: >> Hi All, >> >> I was wondering how I could integrate the spamhaus drop list >> (http://www.spamhaus.org/drop/drop.lasso) into my Netfilter rules. >> >> The list is not too long, so I thought putting it directly into a new >> chain >> would be doable without degrading too much the performances. Somebody >> also >> told me to use a chains tree, but I wonder if this is necessary >> considering >> the size of the list... >> >> Has anybody done this before ? >> >> Thanks, >> Julien > > google von "iptables spamhaus" gives you the site: > http://robotterror.com/site/wiki/aggressive_spam_and_zombie_blocking_via_spamhaus_org_drop_and_iptables > > on the first place. > > Cheers, > Dear Doctor, Thanks for your tremendous help for adding a rule in a chain...... :/ My question, however, concerns more the performances issue. This list will be checked for every single TCP-SYN or UDP packet that goes through the kernel, and if the first byte is something like 128 , it's definitely useless to try all the 91.* But implementing a tree of chains in netfilter is also quite a pain in the ass. So before choosing a solution, I would like the opinion of the community. Best regards, Julien -- www.linuxwall.info ^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: SpamHaus DROP list in Netfilter 2008-12-16 16:30 ` Julien Vehent @ 2008-12-16 17:55 ` Sven-Haegar Koch 2008-12-17 10:03 ` Julien Vehent 0 siblings, 1 reply; 4+ messages in thread From: Sven-Haegar Koch @ 2008-12-16 17:55 UTC (permalink / raw) To: Julien Vehent; +Cc: Michael Schwartzkopff, netfilter On Tue, 16 Dec 2008, Julien Vehent wrote: > On Tue, 16 Dec 2008 16:04:36 +0100, Michael Schwartzkopff > <misch@multinet.de> wrote: > > Am Dienstag, 16. Dezember 2008 15:27 schrieben Sie: > >> Hi All, > >> > >> I was wondering how I could integrate the spamhaus drop list > >> (http://www.spamhaus.org/drop/drop.lasso) into my Netfilter rules. > >> > >> The list is not too long, so I thought putting it directly into a new > >> chain > >> would be doable without degrading too much the performances. Somebody > >> also > >> told me to use a chains tree, but I wonder if this is necessary > >> considering > >> the size of the list... > >> > >> Has anybody done this before ? > >> > >> Thanks, > >> Julien > > > > google von "iptables spamhaus" gives you the site: > > > http://robotterror.com/site/wiki/aggressive_spam_and_zombie_blocking_via_spamhaus_org_drop_and_iptables > > > > on the first place. > > > > Cheers, > > > > Dear Doctor, > > Thanks for your tremendous help for adding a rule in a chain...... :/ > > My question, however, concerns more the performances issue. This list will > be checked for every single TCP-SYN or UDP packet that goes through the > kernel, and if the first byte is something like 128 , it's definitely > useless to try all the 91.* > > But implementing a tree of chains in netfilter is also quite a pain in the > ass. So before choosing a solution, I would like the opinion of the > community. This sounds like a job for the "iphash" map of the ipset netfilter extension. Only one rule in your ruleset and a hash-table with the addresses to block. c'ya sven -- The lights are fading out, once more... ^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: SpamHaus DROP list in Netfilter 2008-12-16 17:55 ` Sven-Haegar Koch @ 2008-12-17 10:03 ` Julien Vehent 0 siblings, 0 replies; 4+ messages in thread From: Julien Vehent @ 2008-12-17 10:03 UTC (permalink / raw) To: Sven-Haegar Koch; +Cc: Michael Schwartzkopff, netfilter On Tue, 16 Dec 2008 18:55:10 +0100 (CET), Sven-Haegar Koch <haegar@sdinet.de> wrote: > On Tue, 16 Dec 2008, Julien Vehent wrote: > >> On Tue, 16 Dec 2008 16:04:36 +0100, Michael Schwartzkopff >> <misch@multinet.de> wrote: >> > Am Dienstag, 16. Dezember 2008 15:27 schrieben Sie: >> >> Hi All, >> >> >> >> I was wondering how I could integrate the spamhaus drop list >> >> (http://www.spamhaus.org/drop/drop.lasso) into my Netfilter rules. >> >> >> >> The list is not too long, so I thought putting it directly into a new >> >> chain >> >> would be doable without degrading too much the performances. Somebody >> >> also >> >> told me to use a chains tree, but I wonder if this is necessary >> >> considering >> >> the size of the list... >> >> >> >> Has anybody done this before ? >> >> >> >> Thanks, >> >> Julien >> > >> > google von "iptables spamhaus" gives you the site: >> > >> http://robotterror.com/site/wiki/aggressive_spam_and_zombie_blocking_via_spamhaus_org_drop_and_iptables >> > >> > on the first place. >> > >> > Cheers, >> > >> >> Dear Doctor, >> >> Thanks for your tremendous help for adding a rule in a chain...... :/ >> >> My question, however, concerns more the performances issue. This list >> will >> be checked for every single TCP-SYN or UDP packet that goes through the >> kernel, and if the first byte is something like 128 , it's definitely >> useless to try all the 91.* >> >> But implementing a tree of chains in netfilter is also quite a pain in >> the >> ass. So before choosing a solution, I would like the opinion of the >> community. > > This sounds like a job for the "iphash" map of the ipset netfilter > extension. Only one rule in your ruleset and a hash-table with the > addresses to block. > > c'ya > sven > OK ! So, this is what ipset is for ! I discovered this tool during the last userday conference and was wondering how to use it. I guess "nethash" is what I'm looking for : Different size netblocks: nethash ipset -N hash2 nethash ipset -A hash2 192.168.1.0/24 ipset -A hash2 10.1.8.0/21 I will look more deeply at this. Thanks for the pointer. -- www.linuxwall.info ^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2008-12-17 10:03 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2008-12-16 14:27 SpamHaus DROP list in Netfilter Julien Vehent
[not found] ` <200812161604.37183.misch@multinet.de>
2008-12-16 16:30 ` Julien Vehent
2008-12-16 17:55 ` Sven-Haegar Koch
2008-12-17 10:03 ` Julien Vehent
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox