瀏覽代碼

DNS rate limiting to prevent amplifiction attacks

root 5 年之前
父節點
當前提交
641bde3045
共有 1 個文件被更改,包括 4 次插入2 次删除
  1. 4 2
      nftables.test.rules

+ 4 - 2
nftables.test.rules

@@ -54,8 +54,10 @@ add rule inet filter OUTPUT tcp sport 32768-65535 tcp dport 43 counter accept
 # DNS
 # DNS
 add rule inet filter OUTPUT udp sport 1024-65535 udp dport 53 counter accept
 add rule inet filter OUTPUT udp sport 1024-65535 udp dport 53 counter accept
 add rule inet filter OUTPUT tcp sport 32768-65535 tcp dport 53 counter accept
 add rule inet filter OUTPUT tcp sport 32768-65535 tcp dport 53 counter accept
-add rule inet filter INPUT udp sport 1024-65535 udp dport 53 counter accept
-add rule inet filter INPUT tcp sport 32768-65535 tcp dport 53 counter accept
+add rule inet filter INPUT meter DNSTHROTTLE_UDP_INGRESS { ip saddr and 255.255.255.0 timeout 60s limit rate 30/minute burst 10 packets} udp sport 1024-65535 udp dport 53 counter accept
+add rule inet filter INPUT meter DNSTHROTTLE_TCP_INGRESS { ip saddr and 255.255.255.0 timeout 60s limit rate 30/minute burst 10 packets} tcp sport 32768-65535 tcp dport 53 counter accept
+#add rule inet filter INPUT udp sport 1024-65535 udp dport 53 counter accept
+#add rule inet filter INPUT tcp sport 32768-65535 tcp dport 53 counter accept
 
 
 # DHCP client
 # DHCP client
 add rule inet filter INPUT ip daddr 255.255.255.255 udp sport 67 udp dport 68 counter accept
 add rule inet filter INPUT ip daddr 255.255.255.255 udp sport 67 udp dport 68 counter accept