iptables:dns_query_limiting
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
iptables:dns_query_limiting [2016/07/08 09:42] – peter | iptables:dns_query_limiting [2019/11/29 17:29] (current) – removed peter | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== IPTables - DNS query limiting ====== | ||
- | |||
- | Analysis of DNS queries coming in was able to determine an average of 5 requests per second per IP. | ||
- | |||
- | This figure could be set as the limit for the firewall, however to prevent instances where a lot of valid requests come in a relatively short amount of time, it is better to not measure over a single second but an average over a longer period. | ||
- | |||
- | To tighten the security even more, the firewall is also set to allow a maximum of 15 requests per second per IP. | ||
- | |||
- | <code bash> | ||
- | #!/bin/bash | ||
- | # This script limits the queries per second to 5/s | ||
- | # with a burst rate of 15/s and does not require | ||
- | # buffer space changes | ||
- | |||
- | # Requests per second | ||
- | RQS=" | ||
- | |||
- | # Requests per 10 seconds | ||
- | RQH=" | ||
- | |||
- | iptables --flush | ||
- | iptables -A INPUT -p udp --dport 53 -m state --state NEW -m recent --set --name DNSQF --rsource | ||
- | iptables -A INPUT -p udp --dport 53 -m state --state NEW -m recent --update --seconds 1 --hitcount ${RQS} --name DNSQF --rsource -j DROP | ||
- | iptables -A INPUT -p udp --dport 53 -m state --state NEW -m recent --set --name DNSHF --rsource | ||
- | iptables -A INPUT -p udp --dport 53 -m state --state NEW -m recent --update --seconds 7 --hitcount ${RQH} --name DNSHF --rsource -j DROP | ||
- | </ | ||
iptables/dns_query_limiting.1467970957.txt.gz · Last modified: 2020/07/15 09:30 (external edit)