iptables:rate_limiting
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
iptables:rate_limiting [2016/07/03 22:17] – peter | iptables:rate_limiting [2019/11/29 17:41] (current) – removed peter | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== IPTables - Rate Limiting ====== | ||
- | |||
- | The Netfilter system includes a variety of matchers which we can use to implement rate limiting solutions. | ||
- | |||
- | **limit** | ||
- | |||
- | This matcher can be used to limit matching of a rule to a rate specified. | ||
- | | ||
- | **connlimit** | ||
- | |||
- | This matcher can be used to limit matching of a rule based on the number of existing active connections from a given host or address block. | ||
- | | ||
- | **hashlimit** | ||
- | |||
- | This matcher can be used to limit matching of a rule to a rate specified on a per address, or per address-port tuple, basis. | ||
- | | ||
- | **recent** | ||
- | |||
- | This matcher can be used to create, update, and perform actions based on the contents of dynamic lists of addresses. | ||
- | |||
- | As you can see there is a matcher for pretty much every imaginable scenario. | ||
- | |||
- | |||
- | ===== Simple Rate Limiting ===== | ||
- | |||
- | Simple rate limiting is adequate for controlling the size of a log file it is not really suitable for much else. We could use it to limit the number of connection attempts to a particular service in any given period, for example, but as it pays no regard to who is attempting to connect this would just be a recipe for an easy denial of service attack. | ||
- | |||
- | This may sound unnecessary but each log file entry is approximately 200 bytes. | ||
- | |||
- | <code bash> | ||
- | iptables -N LOGDROP | ||
- | iptables -A LOGDROP -j LOG --log-prefix ' | ||
- | iptables -A LOGDROP -m limit --limit 1/second --limit-burst 20 \ | ||
- | -j LOG --log-prefix ' | ||
- | iptables -A LOGDROP -j DROP | ||
- | </ | ||
- | |||
- | |||
- | ===== Connection Limiting ===== | ||
- | |||
- | Sometimes it can be useful to be able to control the number of simultaneous connections which may be opened to a particular resource from a given host or network. | ||
- | |||
- | As remote shell access is a fairly commonly offered service, and one which it is desirable to exert some level of control over, let's modify our firewall configuration script to only allow a maximum of two simultaneous ssh connections from any address. | ||
- | |||
- | <code bash> | ||
- | iptables -A TCP-IN-REQ | ||
- | -m connlimit --connlimit-above 2 -j REJECT --reject-with icmp-admin-prohibited | ||
- | iptables -A TCP-IN-REQ | ||
- | iptables -A TCP-IN-REQ | ||
- | iptables -A TCP-OUT-RESP -p tcp --sport ssh -m state --state ESTABLISHED -j ACCEPT | ||
- | </ | ||
- | |||
iptables/rate_limiting.1467584251.txt.gz · Last modified: 2020/07/15 09:30 (external edit)