Blocking tens of thousands of IP's
Cox, Eric S
eric.cox at kroger.com
Tue Nov 1 22:43:27 UTC 2016
Unfortunately much like others have stated, we also don't have the automation at the firewall layer to move as quickly as we would like. So at the moment its not an option.
From: Rainer Duffner [rainer at ultra-secure.de]
Received: Tuesday, 01 Nov 2016, 6:41PM
To: nginx at nginx.org [nginx at nginx.org]
Subject: Re: Blocking tens of thousands of IP's
Am 01.11.2016 um 23:35 schrieb Cox, Eric S <eric.cox at kroger.com<mailto:eric.cox at kroger.com>>:
Currently we track all access logs realtime via an in house built log aggregation solution. Various algorithms are setup to detect said IPS whether it be by hit rate, country, known types of attacks etc. These IPS are typically identified within a few mins and we reload to banned list every 60 seconds. We just moved some services from apache where we were doing this without any noticable performance impact. Have this working in nginx but was looking for general suggestion on how to optimize if at all possible.
Ah, if you already have the data pre-processed…
I’d move blocking to the host’s firewall, as suggested.
Long term, I want to do this (or at least be able to), too.
We (MSP) have a rather large number of firewalls and telling the network-guys „Block this IP at all of them“ does not work (it would probably take them the better part of the day).
They don’t believe in automation...
This e-mail message, including any attachments, is for the sole use of the intended recipient(s) and may contain information that is confidential and protected by law from unauthorized disclosure. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message.
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the nginx