Szakalaka Posted May 2, 2017 Posted May 2, 2017 Hi, is there anyone with experience on CF? I got small web server on my vps (literally nothing interesting here), i allow only IPs from cloudflare range, so it's impossible to connect directly. Now, i am under ddos, and CF seems not to filter out the requests. At this point there were total 80kk requests from ONLY 30 unique visitors. How can i configure CF to ban IPs that connect lets say more than 1k times over an hour? I spent hours digging in their documentation and tools...
Szakalaka Posted May 2, 2017 Author Posted May 2, 2017 Well i suppose, but a lot of people around here talk about such things aswell.
P-Host Posted May 2, 2017 Posted May 2, 2017 Do you have paid of DDoS Protection on cloudflare or just took the free plan? Because the free plan its not protecting you from DDoS Attacks.
Szakalaka Posted May 2, 2017 Author Posted May 2, 2017 Free one. But blocking some IP is such a basic operation it should be available ; O
pirama Posted May 2, 2017 Posted May 2, 2017 (edited) 300$ you don"t have idea :) Edited May 2, 2017 by pirama
Sdw Posted May 3, 2017 Posted May 3, 2017 What kind of request do you get ? What OS and what webserver ?
eressea Posted May 3, 2017 Posted May 3, 2017 What OS do you have there? If Linux, how about trying some filtering (rate limits etc) with iptables?
xxdem Posted May 3, 2017 Posted May 3, 2017 iptables is your friend, it can do anything you describe and literally ALL firewalls are just user interfaces for plain iptables. Just look for a guide on the net
Szakalaka Posted May 3, 2017 Author Posted May 3, 2017 I know i can do it with iptables. The thing is, its just a tiny tiny vps, so every connection = check in the iptables. I just wanted cloudflare to take responsibility of filtering, not to let them into my server at all.
xxdem Posted May 3, 2017 Posted May 3, 2017 I know i can do it with iptables. The thing is, its just a tiny tiny vps, so every connection = check in the iptables. I just wanted cloudflare to take responsibility of filtering, not to let them into my server at all. None will do that for free. Keep in mind that iptables has nearly zero overhead and a very slight one in case of a few million records
eressea Posted May 3, 2017 Posted May 3, 2017 (edited) iptables is your friend, it can do anything you describe and literally ALL firewalls are just user interfaces for plain iptables. Just look for a guide on the net Unless you have some special hardware like Radware DefensePro I know i can do it with iptables. The thing is, its just a tiny tiny vps, so every connection = check in the iptables. I just wanted cloudflare to take responsibility of filtering, not to let them into my server at all. I fear you won't find any free service for it; or at least service you can count on Keep in mind that iptables has nearly zero overhead and a very slight one in case of a few million records Depends on how many rules do you use, whether you use conntracking (and whether you use it the right way - then it can help much because you check only SYN packets and pass through the rest) etc... There's also lot of additional settings that might interest you like SYN cookies. Szaka: If I were you, I'd start with iptables and try to find something better only if iptables won't do it EDIT: In case you need to check whether IP belongs to some set, don't set rules for all those addresses. Use ipset http://ipset.netfilter.org/ Edited May 3, 2017 by eressea
xxdem Posted May 3, 2017 Posted May 3, 2017 Unless you have some special hardware like Radware DefensePro AFAIK even hardware firewalls internally use iptables. Except if someone writes his own OS for the firewall a case I really doubt since the iptables that comes with the linux Kernel is an extremely good and reliable base. I may be wrong because I don't have much hands-on experience with firewalls
eressea Posted May 3, 2017 Posted May 3, 2017 AFAIK even hardware firewalls internally use iptables. Except if someone writes his own OS for the firewall a case I really doubt since the iptables that comes with the linux Kernel is an extremely good and reliable base. I may be wrong because I don't have much hands-on experience with firewalls When it's Linux-based, it will use iptables, that's fact. There are some other options that are used commonly, for example pfSense which is FreeBSD-based. Also Cisco has it's own operating system (IOS, don't confuse with iOS)
Sdw Posted May 3, 2017 Posted May 3, 2017 Depending on how, you can act on iptables or webserver, cloudflare, beside declaring yourself under attack you can't do shit. I wouldn't even consider those guy to protect me.
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now