Hi,

I've noticed when creating DROP rules against malicious traffic, shorewall 
creates them in the ZONE2ZONE chain (in my example wan2dmz).
However, getting to the DROP entry involves several jumps between chains, and 
happens pretty late (if I got it right).

When looking at the graphic at http://www.shorewall.net/images/Netfilter.png, 
it seems the best way would be to have shorewall create a DROP rule against 
malicious traffic in the mangle table. My benchmarks show that this way, the 
machine running shorewall can reach a much higher (40%-50%) rate when it's 
attacked with very small packets. In one test it was about 2.2mpps vs 4.1mpps 
on an E3-1270 with a 10GE Intel NIC.

Could we add an option to /etc/shorewall/interfaces that would enable creation 
of DROP rules in mangle? Something like this:
net eth0 detect mangledrop

and then in rules, I'd have this for example and it'd be created in the mangle 
table.
DROP net:1.2.3.4 dmz udp 0:65535 0,53

Any opinions on this? I'm probably missing something...?


Best regards,

Stefan Behte

--------------------------------------------

Stefan Behte
Teamleiter Systemadministration

Babiel GmbH
Erkrather Str. 224a
D-40233 Düsseldorf

Tel: 0211-179349 0
Fax: 0211-179349 29
E-Mail: [email protected]
Internet: http://www.babiel.com

Geschäftsführer: Georg Babiel, Dr. Rainer Babiel, Harald Babiel Amtsgericht 
Düsseldorf HRB 38633
------------------------------------------------------------------------------
Android is increasing in popularity, but the open development platform that
developers love is also attractive to malware creators. Download this white
paper to learn more about secure code signing practices that can help keep
Android apps secure.
http://pubads.g.doubleclick.net/gampad/clk?id=65839951&iu=/4140/ostg.clktrk
_______________________________________________
Shorewall-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-devel

Reply via email to