Hi all.

I use module pike.so and exec.so to automatically add flooding IP addresses to 
firewall rejecting rules.
The code is as follows:

pike_check_req();
    switch($retcode) {
        case -2:    # detected once - simply drop the request
            exit;
        case -1:    # detected again - ban the IP and drop request
            exec("/usr/bin/sudo iptables -A INPUT -s $si -p udp -j DROP -m 
comment --comment 'blacklisted by OpenSIPS' && { echo \"/usr/bin/sudo iptables 
-D INPUT -s $si -p udp -
j DROP -m comment --comment 'blacklisted by OpenSIPS'\" | at now + 5 min; }");
                        exit;
    }


Everything works fine, except that sometimes there are too much iptables 
entries  are generated, which are the same:

root@deb-node-2:~# iptables -L INPUT -vn --line-numbers
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
num   pkts bytes target     prot opt in     out     source               
destination
1        0     0 DROP       udp  --  *      *       172.16.0.5           
0.0.0.0/0            /* blacklisted by OpenSIPS */
2        0     0 DROP       udp  --  *      *       172.16.0.5           
0.0.0.0/0            /* blacklisted by OpenSIPS */
3        0     0 DROP       udp  --  *      *       172.16.0.5           
0.0.0.0/0            /* blacklisted by OpenSIPS */
... ... ...
87       0     0 DROP       udp  --  *      *       172.16.0.5           
0.0.0.0/0            /* blacklisted by OpenSIPS */


So I'm trying to understand what is the best way to generate only one iptables 
rule.
Is it possible to do with opensips, or the only way is to run some script which 
will look if there is already an iptables denying rule, 
and if it's true, not to add one more rule.

-----------------------------------------------
BR, Alexey
http://alexeyka.zantsev.com/
_______________________________________________
Users mailing list
Users@lists.opensips.org
http://lists.opensips.org/cgi-bin/mailman/listinfo/users

Reply via email to