Ban an IP address on demand through a POSIX or System V queue
Prefered queue implementation is POSIX one (more flexible) - fallback to System V one if POSIX queue is not available.
banipd [options] -q <queue name> -t <table name>
-v/--verbose
: be verbose-d/--daemonize
: daemonize (default: off)-e/--engine <engine>
: name of the firewall to use (optional except for NetBSD if PF and NPF are both enabled)-l/--log <filename>
: logfile (default: stderr)-p/--pid <filename>
: pidfile (default: none)-q/--queue <queue name>
: name of the queue-g/--group <group>
: name of the group to run as-b/--msgsize <size>
: maximum messages size (in bytes) (default: 1024)-s/--qsize <size>
: maximum messages in queue (default: 10)-t/--table <table name>
: name of the table/set/chain
Name | Status | CIDR support | Extra |
---|---|---|---|
PF | in use | yes | states killing |
NPF | for testing | no (only in NetBSD-current?) | - |
iptables | not tested | no (todo) | - |
nftables | broken | ? | - |
- Create a table in your pf.conf (eg:
table <blacklist> persist file "/etc/pf.table.blacklist"
) - Block trafic from those adresses (
block quick from <blacklist>
)
Quick testing (if you currently use no firewall):
kldload pf
cat >> /etc/pf.conf <<EOF
set skip on { lo0 re0 } # put all your interfaces here
table <spammers> persist
EOF
pfctl -f /etc/pf.conf
pfctl -e # check for Status: Enabled in output from pfctl -si
- Create a table in your npf.conf (eg:
table <blacklist> type hash dynamic
) - Block trafic from those adresses (
block in final from <blacklist>
)
WARNING: for now, NPF gives a numeric identifier to tables but they could change when reloading your rules.
Table names are only supported in NetBSD-current.
Add a new chain, named banip below:
iptables -N banip
iptables -A banip -j RETURN
iptables -I INPUT -j banip # add any other option if you only want to block a specific trafic (eg: -p tcp --dport http)
-
Install ipset
-
Create 2 sets named blacklist[46]:
ipset create blacklist4 hash:net family inet
ipset create blacklist6 hash:net family inet6
- Add 2 rules to iptables
iptables -I INPUT -m set --match-set blacklist4 src -j DROP
iptables -I INPUT -m set --match-set blacklist6 src -j DROP
In the future? (status: incomplete)
- cmake
- bash for tests
cd .../banip
cmake . # or build it into an other directory
make
(sudo) make install
Create a specific group and run varnish or any client and this program under it (in fact, this is mandatory, else you'll get "permission denied" error, because queue is not writable by "others")
Add a pass quick
(or PF equivalent) rule prior to whitelist one or more IP you may use to ensure an access to your host:
table <whitelist> persist { ip1 ip2 }
table <blacklist> persist file "/etc/pf.table.blacklist"
#
# Default behavior
block log all
# Allow at least SSH access
pass in quick log on ... proto tcp from <whitelist> ... port ssh
# Deny all suspicious hosts
block quick from <blacklist>
# ...
Note: an alternate approach, specific to PF, is to prevently add these addresses by negating them (echo \!A.B.C.D >> /etc/pf.table.blacklist
).
Send a USR1 signal when rotating log
/etc/newsyslog.conf:
/.../banipd.log root:wheel 600 <other attributes> /.../banipd.pid 30