[MLUG] [ot] Looking for high performance open source firewall

Jean-Francois Theroux jf at theroux.ca
Thu Dec 18 08:37:08 EST 2008


Having dealt in the past with DDoS and SYN attacks, I recommend the
following: don't bother. If you ever get attacked that way, pick up the
phone and call Videotron. They have the gear to filter that crap in a much
more efficient manner that you ever could. They deal with that on a weekly
basis.

It's better to block those attacks a level above you anyway. The reason is
simple, it has to be blocked before it reaches your network to be 100%
effective.

-jf

On Thu, Dec 18, 2008 at 8:32 AM, David Filion <david at filiontech.com> wrote:

>
> Just for the record, I had simplified things.  Our setup actually looks
> like:
>
>   FIBRE    FIBRE
>     ||       ||
>   CISCO----CISCO
>     \\     //
>      ||   //
>      SWITCH===OTHER STUFF ON SWITCH
>      //  \\
>     LB    LB
>     ||    ||
>     SWITCH(ES)
>     // || \\
>   S E R V E R S
>
>
> As Jen-Francois said, "Videotron doesn't allow you to terminate your
> loop into something that doesn't belong to them.  Their router is the
> demarc."  The routers belong to Videotron, I have no control over or
> access to them.  Only one fibre is active at a time, spanning tree is
> used to switch between them is one of the routers/fires fails.
>
> My goal was to try and get a synproxy setup somewhere in front of the
> load balancers so that if a syn attacked occurred,  we'd be saving our
> servers behind the load balancers from getting overloaded with SYNs.
> So far, getting more servers, breaking TCPs timeout settings,  and/or
> replacing our Linux load balancers with a version of BSD seem to be the
> only solutions.
>
> Iptables is setup on the load balancers.  Iptables doesn't help because
> it lets the SYNs go right through to the servers because it doesn't know
> the incoming SYN is an invalid SYN.  The only thing it can provide it
> rate limiting, but that is not currently an option.
>
> Seems a "drop in" solution is not in my future.  Oh well.
>
> Thanks to all that answered/suggested.
>
> David
>
>
> Andy Pintar wrote:
> > I'd say that the solution has presented itself.  As far as I see it, you
> > only have to readdress your load balancers. If you have a big block of
> IPs
> > you won't have to run NAT on your firewall.  I'm guessing it looks like
> > this:
> >
> >      FIBRE
> >        ||
> >      CISCO
> >        ||
> >      SWITCH===OTHER STUFF ON SWITCH
> >        ||
> >      LOAD BALANCER
> >      ||   ||   ||
> >          LVS
> >
> >
> > Why don't you hook up a firewall between the cisco and the switch, give
> it
> > a public IP, and forget about it?  Sure you'll have to reconfig your
> > routing a bit but all traffic will *NOT* look like it came from a private
> > IP space.  I mean, even in the basic home user NAT case where you have a
> > single dynamic IP, incoming traffic doesn't look like it's from inside
> the
> > network.  So if you have a big enough IP space and don't need NAT anyway,
> > then you won't need to run NAT with the firewall operational.  In this
> > case you can run any of the expensive ones (checkpoint) or just use PF
> > with the syn proxy on.
> >
> > Please anyone correct me if I've misunderstood/miscommunicated.
> > Thanks;
> > -Andy.
> >
> > On Wed, 17 Dec 2008, David Filion wrote:
> > ...
> >
> >> OK, I'll keep it simple.
> >>
> >> ISP's fibre comes into our server room.  It's connected to a Cisco 3xxx
> >> series router.  That router is plugged into a switch.  Also plugged into
> >> the switch in a load balancer running Linux+LVS.  The side of the router
> >> facing us is providing our live ips, it's not NATing.  I'm assuming the
> >> interface facing the ISP is a 10.0.0.0/8 or something similar.   This
> >> results in us being able to assign our live IPs to our load balancer(s)
> >> and other server as needed.
> >>
> > ...
> >
> >> I was just hoping to find something to filter out some of the garbage
> >> traffic before it hit our systems.  I didn't want to add an additional
> >> layer of NATing because to our web servers, everything would look like
> >> it came from an private IP space and not from the real client.
> >>
> > _______________________________________________
> > mlug mailing list
> > mlug at listserv.mlug.ca
> >
> https://listes.koumbit.net/cgi-bin/mailman/listinfo/mlug-listserv.mlug.ca
> >
>
> _______________________________________________
> mlug mailing list
> mlug at listserv.mlug.ca
> https://listes.koumbit.net/cgi-bin/mailman/listinfo/mlug-listserv.mlug.ca
>



-- 
Jean-François Théroux
Linux/network security consultant
http://www.theroux.ca
-------------- next part --------------
An HTML attachment was scrubbed...
URL: /pipermail/mlug-listserv.mlug.ca/attachments/20081218/d21e5f87/attachment.htm 


More information about the mlug mailing list