Hi , Shorewall friends,

I have been liking Shorewall for many years.

On my dedicated cloud server, I desired to drop all of attempts of
random probes,  from I suppose piracy activities from all around the
world (Viet Nam,China,Russian, US, Europe... ).

I know that it looks like fail2ban . but as a beginner in defense
work, I prefer to keep the control, and measure the impact of each
action. And I will discover the limit of the blacklist rules number,
with this principle,
too !

The strategy is: regularly extracting from syslog all the IP addresses
given by the default drop rule, sort them,  and append them to the
blrules, then reload shorewall.
After 4 monthes, my collection is big of more than 150000 IP adresses
collected to the "blrules" file.

It worked fine on "Debian stretch". Restarting shorewall takes ~6mn,
And I did not notice any sensible slow-down of the traffic.

Then now, "Debian buster" is stable, and i want of course port this
work after dist-upgrade of my server.
But it seems that shorewall on "buster"  shorewall is blocked with
such a blrules file .

versions of shorewall :
on buster : shorewall: 5.2.3.2-1
on stretch : shorewall:5.0.15.6-1

I tried to iptables-save the iptables rules on stretch , and restore
them directly to buster. but iptables-restore refuses:
iptables-restore: line 460962 failed !
yes: as I have 3 zones , the 150000 blrules are x3 , once for each zone.
So really Shorewall gives 450000 blrules to iptables!

Thank you for any idea.


Yours
Jerome


_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to