Linux Netfilter discussions
 help / color / mirror / Atom feed
* banning bot ips with ipset
@ 2008-11-25 21:00 Nigel Heron
  2008-11-25 22:25 ` G.W. Haywood
                   ` (2 more replies)
  0 siblings, 3 replies; 7+ messages in thread
From: Nigel Heron @ 2008-11-25 21:00 UTC (permalink / raw)
  To: netfilter

Hi list,
We're using iptables (with shorewall for config) and lvs on our 
firewall/load balancer. We're being attacked by a botnet alternating 
between http request floods and syn floods. We have a way to identify 
the ips that are http'ing and started dropping them in iptables, once we 
got to ~1700 banned ips the server stopped nat'ing completely (not sure 
why..) and we were forced to remove the blacklist. We're now banning non 
north-american class-As to drop half the bots, but it's obviously not a 
good long term solution. We just came across ipset, but the lack of any 
feedback on the net (besides on *.netfilter.org) has us a bit worried 
about real world deployment. Is ipset stable enough to be deployed on 
live environments? iphash seems like the best set type for us, how many 
ips can the set handle before there's a noticeable slowdown? any 
feedback would be appreciated.

obviously, we don't expect ipset to help us with the syn flood, at 
~30Mb/s of syn traffic, syn cookies aren't helping either, is there a 
syn-proxy implementation for linux?

also, if it helps anyone else .. while trying ipset 2.4.5 i had to add:
#include <stdbool.h>
to "kernel/ip_set_setlist.c" to get it to compile.

thanks,

-nigel.

^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2008-11-26 16:28 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2008-11-25 21:00 banning bot ips with ipset Nigel Heron
2008-11-25 22:25 ` G.W. Haywood
2008-11-25 22:54   ` Adem
2008-11-26  8:16     ` Jozsef Kadlecsik
2008-11-26  7:45 ` Marek Kierdelewicz
2008-11-26  8:25 ` Jozsef Kadlecsik
2008-11-26 16:28   ` Nigel Heron

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox