Blocking very many (tens of thousands) ip addresses in ipfw
George Davidovich
freebsd at optimis.net
Wed Jan 14 22:53:16 PST 2009
On Wed, Jan 14, 2009 at 08:30:53PM -0800, mojo fms wrote:
> On Wed, Jan 14, 2009 at 9:13 AM, Steve Bertrand <steve at ibctech.ca>
> wrote:
> > Pieter de Goeje wrote:
> > > On Wednesday 14 January 2009 17:23:25 Artem Kuchin wrote:
> > > > I need to block around 150000 ip addreses from acccess the server
> > > > at all at any port. The addesses are random, they are not nets.
> > > > These are the spammer i want to block for 24 hours. The list is
> > > > dynamically generated and regenerated every hour or so. What is
> > > > the most efficient way to do it? At first i thought doing ipfw
> > > > rules using 5 ips per rule, that would result in 30000 rules! This
> > > > will be too slow! I need to something really quick and smart.
> > > > Like matching the first number from ip (195 from 192.1.2.3), if it
> > > > does not match - skip, if it does - compare the next one and so
> > > > on.
> > >
> > > Quoting ipfw(8):
> > > LOOKUP TABLES
> > > Lookup tables are useful to handle large sparse address sets,
> > > typically from a hundred to several thousands of entries.
> > > There may be up to 128 different lookup tables, numbered 0 to
> > > 127.
> > >
> > > net.inet.ip.fw.dyn_buckets should probably also be increased to
> > > efficiently handle 150k IPs.
> >
> > Please correct me if I'm wrong, but if the OP is going to drop all
> > traffic immediately from the 150k IPs, then dyn_buckets shouldn't come
> > into play, as there is no dynamic rule generated.
>
> Is this kind of thing doable with PF or really a ipfw thing more?
# pfctl -sm
states hard limit 10000
src-nodes hard limit 10000
frags hard limit 5000
tables hard limit 1000
table-entries hard limit 200000
--
George
More information about the freebsd-questions
mailing list