Skip to content
GitLab
Menu
Projects
Groups
Snippets
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
Menu
Open sidebar
Thomas Capricelli
botfreak
Commits
34ddd342ff53
Commit
bcf55c12
authored
Dec 14, 2021
by
Thomas Capricelli
Browse files
doc++
parent
4042952354af
Changes
1
Hide whitespace changes
Inline
Side-by-side
blockers/linux-ipset/README.rst
View file @
34ddd342
Code in this directory will fetch 'bad'
ip
s from the server and
block
them on the current host/server, using kernel "ipset"s. This is for linux only
.
Code in this directory will fetch 'bad'
IP
s from the server and
add them to ipset 'sets'. We
use one for IPv4 and one for IPv6
.
The proper setup is the following
* those sets are created, typically by init scripts at boot. How to do that depends on your distribution
* configure iptables to USE those sets. Again, this is distribution dependant.
* this script will fill those two sets by querying the botfreak server
Creating the sets
-----------------
The kernel must be compiled with ipset support for hash:ip
CONFIG_IP_SET
CONFIG_IP_SET_HASH_IP
And you need to create two sets:
ipset create botfreak-ipv4 hash:ip family inet maxelem 5000000
ipset create botfreak-ipv6 hash:ip family inet6 maxelem 5000000
The botfreak blocker will check for those before doing anything else, reports, and stops if not present.
Blocking traffic
----------------
(for those sets)
iptables -A INPUT -i $EXTERNAL_INTERFACE -m set --match-set botfreak-ipv4 src -j DROP
ip6tables -A INPUT -i $EXTERNAL_INTERFACE -m set --match-set botfreak-ipv6 src -j DROP
Gentoo
------
Put those 4 lines in a file /etc/local.d/botfreak.start
Write
Preview
Supports
Markdown
0%
Try again
or
attach a new file
.
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment