Blocking Ip address ranges
Gene Heskett
gene.heskett at verizon.net
Wed Jan 26 04:30:31 UTC 2005
On Tuesday 25 January 2005 13:41, Tim Alberts wrote:
>I thought portsentry, hostsentry, logsentry (aka trisentry) were
> bought up and licensing issues ensued. I've seen them being
> maintained at sourceforge, but only logcheck and portsentry have
> downloads and updates haven't been posted in almost 2 years? Are
> these programs still useable?
I haven't tried them on a modern system (read FC3) but portsentry-1.1,
tcpwrappers, and iptables have all been standing guard on my old
RH7.3 firewall box for several years now. Since I put in a linksys
router (got a dsl connection nowadays), only one hit has been logged
in 2 years. And that one got in because it came from one of verizons
own dns servers, so it was a known address to the router. Portsentry
killed the attempt on the first syn-not-ack packet. End of story. 2
years... I'd say thats pretty good. :)
>I've also heard that snort.org is an outstanding program with great
>capabilities. I've haven't personally learned how to use it yet.
> You can actually find books on Amazon etc how to use this pig...and
> from what I've read, it is a pig to configure and work with...
>
>On Wed, 2005-01-26 at 07:29 +1300, Banjo Mailing List wrote:
>> Or use portsentry. if you need any help how to do it tell me
>>
>>
>> On Tue, 25 Jan 2005 12:56:15 -0500, Deron Meranda
>>
>> <deron.meranda at gmail.com> wrote:
>> > > I'm thinking of setting up a rule in Iptables to point to a
>> > > file which I can easily add the IP addresses that I need
>> > > to block. Is this possible and what would be the syntax?
>> >
>> > If you really want to set up something so you can block a large
>> > number of IP addresses and you have the patience to keep up, yes
>> > you could set up some simple scripts to help you automate the
>> > iptables config.
>> >
>> > Note though that you'll probably want to structure iptables with
>> > several chains to help reduce the inefficiency caused by a large
>> > number of rules. For example, you might want a separate chain
>> > for each of the possible 256 first-octets. This should get you
>> > started and give you some ideas (it can be improved upon too).
>> >
>> > iptables -N web_block_1
>> > iptables -N web_block_2
>> > ...
>> > iptables -N web_block_255
>> >
>> > Then create a chain just to dispatch these (so non-web traffic
>> > doesn't have to go through all these rule checks),
>> >
>> > iptables -N web_block
>> >
>> > Then link it into your input chain too,
>> >
>> > iptables -I INPUT -i eth0 -m tcp -p tcp --dport 80 -j web_block
>> > iptables -I INPUT -i eth0 -m tcp -p tcp --dport 443 -j web_block
>> >
>> > Finally in your web_block chain dispatch for each octect,
>> >
>> > iptables -A web_block -s 1.0.0.0/8 -j web_block_1
>> > iptables -A web_block -s 2.0.0.0/8 -j web_block_2
>> > ...
>> > iptables -A web_block -s 255.0.0.0/8 -j web_block_255
>> >
>> > Then you'd add specific IP addresses (or netblocks), as
>> >
>> > iptables -A block_192 -s 192.168.1.1 -j REJECT
>> >
>> > Also if your script updates, be sure to also run iptables_save
>> > so your entries survive reboot.
>> >
>> > Keep in mind though that iptables blocking is the *harsh*
>> > way to do this. Less drastic would be to 1. ignore the logs,
>> > 2. reduce the logging level, 3. look at Apache's Deny
>> > directive.
>> > --
>> > Deron Meranda
>> >
>> > --
>> > fedora-list mailing list
>> > fedora-list at redhat.com
>> > To unsubscribe:
>> > http://www.redhat.com/mailman/listinfo/fedora-list
--
Cheers, Gene
"There are four boxes to be used in defense of liberty:
soap, ballot, jury, and ammo. Please use in that order."
-Ed Howdershelt (Author)
99.32% setiathome rank, not too shabby for a WV hillbilly
Yahoo.com attorneys please note, additions to this message
by Gene Heskett are:
Copyright 2005 by Maurice Eugene Heskett, all rights reserved.
More information about the fedora-list
mailing list