iptables:rate_limiting
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
iptables:rate_limiting [2016/10/20 09:18] – [Simple Rate Limiting] peter | iptables:rate_limiting [2019/11/29 17:41] (current) – removed peter | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== IPTables - Rate Limiting ====== | ||
- | |||
- | The Netfilter system includes a variety of matchers which we can use to implement rate limiting solutions. | ||
- | |||
- | **limit** | ||
- | |||
- | This matcher can be used to limit matching of a rule to a rate specified. | ||
- | | ||
- | **connlimit** | ||
- | |||
- | This matcher can be used to limit matching of a rule based on the number of existing active connections from a given host or address block. | ||
- | | ||
- | **hashlimit** | ||
- | |||
- | This matcher can be used to limit matching of a rule to a rate specified on a per address, or per address-port tuple, basis. | ||
- | | ||
- | **recent** | ||
- | |||
- | This matcher can be used to create, update, and perform actions based on the contents of dynamic lists of addresses. | ||
- | |||
- | As you can see there is a matcher for pretty much every imaginable scenario. | ||
- | |||
- | |||
- | ===== Simple Rate Limiting ===== | ||
- | |||
- | Simple rate limiting is adequate for controlling the size of a log file it is not really suitable for much else. We could use it to limit the number of connection attempts to a particular service in any given period, for example, but as it pays no regard to who is attempting to connect this would just be a recipe for an easy denial of service attack. | ||
- | |||
- | This may sound unnecessary but each log file entry is approximately 200 bytes. | ||
- | |||
- | <code bash> | ||
- | iptables -N LOGDROP | ||
- | iptables -A LOGDROP -j LOG --log-prefix ' | ||
- | iptables -A LOGDROP -m limit --limit 1/second --limit-burst 20 \ | ||
- | -j LOG --log-prefix ' | ||
- | iptables -A LOGDROP -j DROP | ||
- | </ | ||
- | |||
- | Besides logs, actual access into the system can also be limited. | ||
- | |||
- | <code bash> | ||
- | iptables -A INPUT -i eth0 -p tcp --match multiport --dport 80,443 -m state --state NEW -m limit --limit 50/minute --limit-burst 200 -j ACCEPT | ||
- | iptables -A INPUT -i eth0 -m state --state RELATED, | ||
- | </ | ||
- | |||
- | ===== Connection Limiting ===== | ||
- | |||
- | Sometimes it can be useful to be able to control the number of simultaneous connections which may be opened to a particular resource from a given host or network. | ||
- | |||
- | As remote shell access is a fairly commonly offered service, and one which it is desirable to exert some level of control over, let's modify our firewall configuration script to only allow a maximum of two simultaneous ssh connections from any address. | ||
- | |||
- | **NOTE**: | ||
- | |||
- | <code bash> | ||
- | iptables -A TCP-IN-REQ | ||
- | -m connlimit --connlimit-above 2 -j REJECT --reject-with icmp-admin-prohibited | ||
- | iptables -A TCP-IN-REQ | ||
- | iptables -A TCP-IN-REQ | ||
- | iptables -A TCP-OUT-RESP -p tcp --sport ssh -m state --state ESTABLISHED -j ACCEPT | ||
- | </ | ||
- | |||
- | The example rule above rejects any new connection attempts when there are already two or more connections established. | ||
- | |||
- | **NOTE**: This matcher limits connections on a per address basis. | ||
- | |||
- | ===== Per Address / Port Rate Limiting ===== | ||
- | |||
- | As the connlimit matcher has been removed from recent kernels, and some people don't like the idea of patching their kernel by hand, in this section we shall be taking a quick look at another matcher which can be used to mitigate attempts at brute force password cracking and denial of service attacks. | ||
- | |||
- | The hashlimit matcher, like the simple limit matcher we met earlier, accepts two parameters which control the rate of packets to be matched. | ||
- | |||
- | In addition to the parameters mentioned above the hashlimit matcher also requires the match mode to be specified using the --hashlimit-mode parameter. | ||
- | |||
- | **dstip** | ||
- | |||
- | The matcher will record entries in the hash table based on the destination address of the packets. | ||
- | |||
- | **dstport** | ||
- | |||
- | The matcher will record entries in the hash table based on the destination port of the packets. | ||
- | |||
- | **srcip** | ||
- | |||
- | The matcher will record entries in the hash table based on the source address of the packets. | ||
- | |||
- | **srcport** | ||
- | |||
- | The matcher will record entries in the hash table based on the source port of the packets. | ||
- | |||
- | The example code given below uses the hashlimit matcher to limit the number of connection attempts to particular service to one per minute based on the source address from which the connection attempts originate. In this example we are limiting access to the ssh server as we have seen an increasing number of brute force attacks in recent months. | ||
- | |||
- | <code bash> | ||
- | iptables -A TCP-IN-REQ | ||
- | -m hashlimit --hashlimit-name SSH --hashlimit 1/minute --hashlimit-burst 1 \ | ||
- | --hashlimit-mode srcip --hashlimit-htable-expire 300000 -j ACCEPT | ||
- | iptables -A TCP-IN-REQ | ||
- | iptables -A TCP-IN-REQ | ||
- | iptables -A TCP-OUT-RESP -p tcp --sport ssh -m state --state ESTABLISHED -j ACCEPT | ||
- | </ | ||
- | |||
- | The above rule is by no means perfect. | ||
- | |||
- | |||
- | |||
- | ===== Complex Limiting ===== | ||
- | |||
- | In addition to the limit, hashlimit and connlimit matchers discussed so far the Netfilter system comes with another module which allows for the controlled handling of packets based on rate, as well as anything else which can be programmed using the matchers which are already available. | ||
- | |||
- | The recent matcher achieves this level of flexibility by operating in a subtly different way to the matchers which we have covered so far. Instead of matching based on a rigid predefined-plan the recent matcher allows the match logic to be coded using user-defined rules and chains. | ||
- | |||
- | This level of flexibility makes the recent matcher extremely powerful as it can be used to quite literally program the Netfilter system to respond in any way you desire. | ||
- | |||
- | **name** | ||
- | |||
- | This parameter is used to specify the name of the list which all other options will operate on. If no name is specified then the ' | ||
- | |||
- | **set** | ||
- | |||
- | If this option is present in a match specifier then the source address of the current packet will be added to the list. If the source address is already present then the timestamp and hitcount values will be updated accordingly. This option always returns true so that further options will be evaluated. | ||
- | |||
- | **rcheck** | ||
- | |||
- | This option can be used to query the list for the source address of the current packet. | ||
- | |||
- | **update** | ||
- | |||
- | Like the rcheck option above this option is used to query the list for the presence of the source address of the current packet. | ||
- | |||
- | **remove** | ||
- | |||
- | This option causes the source address to be removed from the list if it is present. | ||
- | |||
- | **seconds** | ||
- | |||
- | This option can be used to narrow the match of any of the other options to only include the address if it has a timestamp with a value less than that specified. | ||
- | |||
- | **hitcount** | ||
- | |||
- | Like the seconds option above the hitcount option is used to narrow the match of another option to only include the address if the associated hitcount value is greater than, or equal to, that specified. | ||
- | |||
- | **rttl** | ||
- | |||
- | This option allows you to further restrict the match of an address with a packet to include the TTL value. This option is often used to try to detect when an attacker is forging their source address in an attempt to cause a denial of service to legitimate users. | ||
- | |||
- | As you can see the related matcher is fairly complex. | ||
iptables/rate_limiting.1476955111.txt.gz · Last modified: 2020/07/15 09:30 (external edit)