KuTtY

Founder

gemgemgem
Staff member
Founder
Administrator
Top Poster Of Month
60%
Joined
Oct 5, 2021
Messages
214
Reaction score
24
Points
27
Website
kuttytools.com
1,035
LV
2
 
3 years of service
  • Thread starter
  • Administrator
  • Moderator
  • Staff member
  • #1
1705742094486

There are different ways of building your own anti-DDoS rules for iptables. We will be discussing the most effective iptables DDoS protection methods in this comprehensive tutorial.

This guide will teach you how to select the best iptables table and chain to stop DDoS attacks.
Please note that this article is written for professionals who deal with Linux servers on a daily basis.

What Is IPtables?
netfilter iptables (soon to be replaced by nftables) is a user-space command line utility to configure kernel packet filtering rules developed by netfilter.
It’s the default firewall management utility on Linux systems – everyone working with Linux systems should be familiar with it or have at least heard of it.
iptables can be used to filter certain packets, block source or destination ports and IP addresses, forward packets via NAT and a lot of other things.
Most commonly it’s used to block destination ports and source IP addresses.

You’ll find that most if not all guides on how to block DDoS attacks using iptables use the filter table and the INPUT chain for anti-DDoS rules.
The issue with this approach is that the INPUT chain is only processed after the PREROUTING and FORWARD chains and therefore only applies if the packet doesn’t match any of these two chains.
This causes a delay in the filtering of the packet which consumes resources. In conclusion, to make our rules as effective as possible, we need to move our anti-DDoS rules as far up the chains as possible.

The first chain that can apply to a packet is the PREROUTING chain, so ideally we’ll want to filter the bad packets in this chain already.
However, the filter table doesn’t support the PREROUTING chain. To get around this problem, we can simply use the mangle table instead of the filter table for our anti-DDoS iptables rules.
It supports most if not all rules that the filter table supports while also supporting all iptables chains.
So you want to know why your iptables DDoS protection rules suck? It’s because you use the filter table and the INPUT chain to block the bad packets!

The Complete IPtables Anti-DDoS Rules:

Bash:
Please, Log in or Register to view codes content!



Now we will create the script

Step 1:
Create a bash script with the name of iptables.sh

Bash:
Please, Log in or Register to view codes content!

Step 2: Paste the above given script contents in your bash script file iptables.sh

Step 3: Make the Read Write Execute permission

Bash:
Please, Log in or Register to view codes content!

Step 4 : Now run the script

Bash:
Please, Log in or Register to view codes content!

Step 5: Check the IPTABLES rule with following command

Bash:
Please, Log in or Register to view codes content!
 

Users who are viewing this thread

About us

  • Our community has been around for many years and pride ourselves on offering unbiased, critical discussion among people of all different backgrounds. We are working every day to make sure our community is one of the best.

Quick Navigation

User Menu

0%