Browse Source

DNS rate limiting to prevent amplifiction attacks

root 5 năm trước cách đây
mục cha
commit
641bde3045
1 tập tin đã thay đổi với 4 bổ sung2 xóa
  1. 4 2
      nftables.test.rules

+ 4 - 2
nftables.test.rules

@@ -54,8 +54,10 @@ add rule inet filter OUTPUT tcp sport 32768-65535 tcp dport 43 counter accept
 # DNS
 add rule inet filter OUTPUT udp sport 1024-65535 udp dport 53 counter accept
 add rule inet filter OUTPUT tcp sport 32768-65535 tcp dport 53 counter accept
-add rule inet filter INPUT udp sport 1024-65535 udp dport 53 counter accept
-add rule inet filter INPUT tcp sport 32768-65535 tcp dport 53 counter accept
+add rule inet filter INPUT meter DNSTHROTTLE_UDP_INGRESS { ip saddr and 255.255.255.0 timeout 60s limit rate 30/minute burst 10 packets} udp sport 1024-65535 udp dport 53 counter accept
+add rule inet filter INPUT meter DNSTHROTTLE_TCP_INGRESS { ip saddr and 255.255.255.0 timeout 60s limit rate 30/minute burst 10 packets} tcp sport 32768-65535 tcp dport 53 counter accept
+#add rule inet filter INPUT udp sport 1024-65535 udp dport 53 counter accept
+#add rule inet filter INPUT tcp sport 32768-65535 tcp dport 53 counter accept
 
 # DHCP client
 add rule inet filter INPUT ip daddr 255.255.255.255 udp sport 67 udp dport 68 counter accept