Szakalaka Posted May 2, 2017 Posted May 2, 2017 Hi, is there anyone with experience on CF? I got small web server on my vps (literally nothing interesting here), i allow only IPs from cloudflare range, so it's impossible to connect directly. Now, i am under ddos, and CF seems not to filter out the requests. At this point there were total 80kk requests from ONLY 30 unique visitors. How can i configure CF to ban IPs that connect lets say more than 1k times over an hour? I spent hours digging in their documentation and tools... Quote
Szakalaka Posted May 2, 2017 Author Posted May 2, 2017 Well i suppose, but a lot of people around here talk about such things aswell. Quote
P-Host Posted May 2, 2017 Posted May 2, 2017 Do you have paid of DDoS Protection on cloudflare or just took the free plan? Because the free plan its not protecting you from DDoS Attacks. Quote
Szakalaka Posted May 2, 2017 Author Posted May 2, 2017 Free one. But blocking some IP is such a basic operation it should be available ; O Quote
pirama Posted May 2, 2017 Posted May 2, 2017 (edited) 300$ you don"t have idea :) Edited May 2, 2017 by pirama Quote
Sdw Posted May 3, 2017 Posted May 3, 2017 What kind of request do you get ? What OS and what webserver ? Quote
eressea Posted May 3, 2017 Posted May 3, 2017 What OS do you have there? If Linux, how about trying some filtering (rate limits etc) with iptables? Quote
xxdem Posted May 3, 2017 Posted May 3, 2017 iptables is your friend, it can do anything you describe and literally ALL firewalls are just user interfaces for plain iptables. Just look for a guide on the net Quote
Szakalaka Posted May 3, 2017 Author Posted May 3, 2017 I know i can do it with iptables. The thing is, its just a tiny tiny vps, so every connection = check in the iptables. I just wanted cloudflare to take responsibility of filtering, not to let them into my server at all. Quote
xxdem Posted May 3, 2017 Posted May 3, 2017 I know i can do it with iptables. The thing is, its just a tiny tiny vps, so every connection = check in the iptables. I just wanted cloudflare to take responsibility of filtering, not to let them into my server at all. None will do that for free. Keep in mind that iptables has nearly zero overhead and a very slight one in case of a few million records Quote
eressea Posted May 3, 2017 Posted May 3, 2017 (edited) iptables is your friend, it can do anything you describe and literally ALL firewalls are just user interfaces for plain iptables. Just look for a guide on the net Unless you have some special hardware like Radware DefensePro I know i can do it with iptables. The thing is, its just a tiny tiny vps, so every connection = check in the iptables. I just wanted cloudflare to take responsibility of filtering, not to let them into my server at all. I fear you won't find any free service for it; or at least service you can count on Keep in mind that iptables has nearly zero overhead and a very slight one in case of a few million records Depends on how many rules do you use, whether you use conntracking (and whether you use it the right way - then it can help much because you check only SYN packets and pass through the rest) etc... There's also lot of additional settings that might interest you like SYN cookies. Szaka: If I were you, I'd start with iptables and try to find something better only if iptables won't do it EDIT: In case you need to check whether IP belongs to some set, don't set rules for all those addresses. Use ipset http://ipset.netfilter.org/ Edited May 3, 2017 by eressea Quote
xxdem Posted May 3, 2017 Posted May 3, 2017 Unless you have some special hardware like Radware DefensePro AFAIK even hardware firewalls internally use iptables. Except if someone writes his own OS for the firewall a case I really doubt since the iptables that comes with the linux Kernel is an extremely good and reliable base. I may be wrong because I don't have much hands-on experience with firewalls Quote
eressea Posted May 3, 2017 Posted May 3, 2017 AFAIK even hardware firewalls internally use iptables. Except if someone writes his own OS for the firewall a case I really doubt since the iptables that comes with the linux Kernel is an extremely good and reliable base. I may be wrong because I don't have much hands-on experience with firewalls When it's Linux-based, it will use iptables, that's fact. There are some other options that are used commonly, for example pfSense which is FreeBSD-based. Also Cisco has it's own operating system (IOS, don't confuse with iOS) Quote
Sdw Posted May 3, 2017 Posted May 3, 2017 Depending on how, you can act on iptables or webserver, cloudflare, beside declaring yourself under attack you can't do shit. I wouldn't even consider those guy to protect me. Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.