[asterisk-users] Numbers hackers call

Stefan Gofferje lists at home.gofferje.net
Thu Mar 27 15:26:30 CDT 2014


On 03/27/2014 08:36 PM, Eric Wieling wrote:
> I have an iptables file which blocks all traffic except traffic from networks allocated by ARIN or are Legacy networks.   I pulled the information from http://www.iana.org/assignments/ipv4-address-space/ipv4-address-space.xhtml  
> 
> My iptables script can be found at the link below. 
> 
> http://help.nyigc.net/tmp/iptables_geoblock
> 	
> It might be helpful to someone.

Below's my solution. I specifically block China, Korea and Palestine.
That already massively reduced my amount of attacks. I can't block as
much as you because I do allow unregistered inbound SIP calls to
sip:stefan at home.mylastname.net. CN, KR and PS are currently the only
attack origins from where I wouldn't expect legit inbound traffic.

Here's my script (pulls data from ipdeny.com). The script is called in
my primary IPTABLES script after flushing and before my specific ruleset.
And it runs on my perimeter firewall.

WARNING: That's about 5000 networks to stuff into the tables! My fw is a
Phenom 8650 3-core machine and it takes about 8.5 minutes to stuff all
the rules into the kernel!

#!/bin/bash

IPTABLES="/sbin/iptables"
ANY="0.0.0.0/0"
BLOCKDIR="blocklist.d"

if ! test -d ${BLOCKDIR}; then
  mkdir ${BLOCKDIR}
fi

DATE=$(date)

echo "Country blocking rules..."
echo "Downloading rules..."

curl -s http://www.ipdeny.com/ipblocks/data/countries/cn.zone -o
${BLOCKDIR}/cn.zone || echo "Warning: Couldn't download CN zone"
curl -s http://www.ipdeny.com/ipblocks/data/countries/kr.zone -o
${BLOCKDIR}/kr.zone || echo "Warning: Couldn't download KR zone"
curl -s http://www.ipdeny.com/ipblocks/data/countries/ps.zone -o
${BLOCKDIR}/ps.zone || echo "Warning: Couldn't download PS zone"

echo "Done downloading. Setting rules..."

for FILE in ${BLOCKDIR}/*zone; do
    for ADDRESS in $(cat ${FILE}); do
        echo "Blocking network: ${ADDRESS}..."
        $IPTABLES -A INPUT -s ${ADDRESS} -d $ANY -j DROP
        $IPTABLES -A INPUT -s ${ADDRESS} -d $ANY -j LOG --log-prefix
"Packet log: COUNTRY DROP "
        $IPTABLES -A FORWARD -s ${ADDRESS} -d $ANY -j DROP
        $IPTABLES -A FORWARD -s ${ADDRESS} -d $ANY -j LOG --log-prefix
"Packet log: COUNTRY DROP "
    done
done

echo "Done. Started: ${DATE}, finished: $(date)"


-- 
 (o_   Stefan Gofferje            | SCLT, MCP, CCSA
 //\   Reg'd Linux User #247167   | VCP #2263
 V_/_  Heckler & Koch - the original point and click interface


-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4079 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://lists.digium.com/pipermail/asterisk-users/attachments/20140327/1b6c7bad/attachment.bin>


More information about the asterisk-users mailing list