Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
freebsd
GitHub Repository: freebsd/freebsd-src
Path: blob/main/contrib/blocklist/etc/ipf.conf
48062 views
1
#========================================
2
#
3
# subsection for abuse blocking
4
#
5
#========================================
6
#
7
# This section should be included early in the main /etc/ipf.conf file, right
8
# after any basic generic accounting ("count") rules, and any cleanup rules to
9
# block invalid fragments, invalid options (e.g. "ssrr"), etc.
10
#
11
# Note these will not actually block anything since they don't include the
12
# "quick" flag, and are thus part of a last-match group. They simply set up a
13
# group such that any connection logging rule further below won't also match if
14
# one of the rules in the group matches, no matter when or where the subsequent
15
# matching rule is added. I.e. all rules in the group are checked for a match
16
# (and a possible "first match" with "quick") before any subsequent rules
17
# further below are used. Note group rules can be added at any time, including
18
# at runtime after all other rules have been added -- they will still belong to
19
# the group and once added will be checked as part of the group.
20
#
21
# head of "blocklistd" group:
22
#
23
# The "blocklistd" group will be used by blocklistd(8).
24
#
25
block in proto tcp/udp from any to any head blocklistd
26
#
27
# head of "attackers" group to block all attackers:
28
#
29
# The "attackers" group is intended to be used for manually maintained rules
30
# e.g. as could be added like this:
31
#
32
# echo 'block return-rst in log quick proto tcp from 118.136.0.0/15 to any flags S/SAFR group attackers' >> /etc/ipf.conf
33
# /etc/rc.d/ipfliter reload
34
#
35
# Note the choice in this example is to return RST packets for blocked SYN
36
# packets to help the other end close. This is not necessary, but it better
37
# mimics what the kernel does by default, thus perhaps hiding the fact a
38
# firewall is present.
39
#
40
# XXX This example still allows UDP services, but we would need to duplicate
41
# each rule with "proto udp" (and without "flags blah") due to IPF parsing
42
# limitations....
43
#
44
block in proto tcp/udp from any to any head attackers
45
#
46
47