On Sat, Sep 27, 2014, at 11:02 AM, Tom Eastep wrote:
> > In the dynamic blacklist management/saving specifically, and SAVE_IPSET 
> > mgmt in general, (how) do you differentiate between single addresses and 
> > ranges?
> 
> I think you are misunderstanding SAVE_IPSETS. That facility uses the
> ipset -S command to safe the contents of the ipsets in a text file and
> reloads them from a text file.

ah, "-S".  Ok.

That, then, still leaves my subsequent musings about redundancy and saving only 
specific IPSETs ...

> I'm going to have to give that some thought, because there are actually
> four commands:
> 
>       drop
>       logdrop 
>       reject
>       logreject

IIUC, those commands are ONLY used in the context of DYNAMIC_BLACKLISTING, is 
that correct?

If so, if I were doing this from scratch, I'd bundle it all within a single 
context:

shorewall[6][-lite] blacklist {drop,reject,remove} [log]

e.g.

shorewall-lite blacklist drop log X.X.X.X/NN

or

shorewall6-lite blacklist reject XXXX:XXXX::

etc

then perl-parsing the IP 4/6 target addresses for CIDR = /32 or (null), or CIDR 
= /1 - /31, and writing to apprproriate hash:ip or hash:net IPSETs, which could 
subsequent be stored persistently if DYNAMIC_BLACKLIST = ipset.

the additional 'remove' action could be used to (wildcard?) search & match the 
existing entries in DYNAMIC_BLACKLIST's IPSET and remove them ...


------------------------------------------------------------------------------
Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer
http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to