IT/서버, 호스팅

우분투 iptables DDOS 방어와 보안 룰셋 (iptables_rule.sh)

LogicalMaster 2020. 7. 28. 21:40

우분투 iptables DDOS 방어와 보안 룰셋입니다.

 

# cloudflare only 는 웹서버를 클라우드플레어 만 접속이 가능하도록 되어있습니다.

 

클플 안쓰는 사람은 # cloudflare only 부분의 룰셋을 빼고 적용합니다.

 

 

iptables --policy INPUT ACCEPT

iptables --policy OUTPUT ACCEPT

iptables --policy FORWARD ACCEPT

 

iptables -Z

iptables -F

iptables -X

 

iptables -t nat -F

iptables -t nat -X

iptables -t mangle -F

iptables -t mangle -X

 

### 1: Drop invalid packets ###

iptables -t mangle -A PREROUTING -m conntrack --ctstate INVALID -j DROP

 

### 2: Drop TCP packets that are new and are not SYN ###

iptables -t mangle -A PREROUTING -p tcp ! --syn -m conntrack --ctstate NEW -j DROP

 

### 3: Drop SYN packets with suspicious MSS value ###

iptables -t mangle -A PREROUTING -p tcp -m conntrack --ctstate NEW -m tcpmss ! --mss 536:65535 -j DROP

 

### 4: Block packets with bogus TCP flags ###

iptables -t mangle -A PREROUTING -p tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE -j DROP

iptables -t mangle -A PREROUTING -p tcp --tcp-flags FIN,SYN FIN,SYN -j DROP

iptables -t mangle -A PREROUTING -p tcp --tcp-flags SYN,RST SYN,RST -j DROP

iptables -t mangle -A PREROUTING -p tcp --tcp-flags FIN,RST FIN,RST -j DROP

iptables -t mangle -A PREROUTING -p tcp --tcp-flags FIN,ACK FIN -j DROP

iptables -t mangle -A PREROUTING -p tcp --tcp-flags ACK,URG URG -j DROP

iptables -t mangle -A PREROUTING -p tcp --tcp-flags ACK,FIN FIN -j DROP

iptables -t mangle -A PREROUTING -p tcp --tcp-flags ACK,PSH PSH -j DROP

iptables -t mangle -A PREROUTING -p tcp --tcp-flags ALL ALL -j DROP

iptables -t mangle -A PREROUTING -p tcp --tcp-flags ALL NONE -j DROP

iptables -t mangle -A PREROUTING -p tcp --tcp-flags ALL FIN,PSH,URG -j DROP

iptables -t mangle -A PREROUTING -p tcp --tcp-flags ALL SYN,FIN,PSH,URG -j DROP

iptables -t mangle -A PREROUTING -p tcp --tcp-flags ALL SYN,RST,ACK,FIN,URG -j DROP

 

### 5: Block spoofed packets ###

iptables -t mangle -A PREROUTING -s 224.0.0.0/3 -j DROP

iptables -t mangle -A PREROUTING -s 169.254.0.0/16 -j DROP

iptables -t mangle -A PREROUTING -s 172.16.0.0/12 -j DROP

iptables -t mangle -A PREROUTING -s 192.0.2.0/24 -j DROP

iptables -t mangle -A PREROUTING -s 192.168.0.0/16 -j DROP

iptables -t mangle -A PREROUTING -s 10.0.0.0/8 -j DROP

iptables -t mangle -A PREROUTING -s 0.0.0.0/8 -j DROP

iptables -t mangle -A PREROUTING -s 240.0.0.0/5 -j DROP

iptables -t mangle -A PREROUTING -s 127.0.0.0/8 ! -i lo -j DROP

 

### 6: Drop ICMP (you usually don't need this protocol) ###

iptables -t mangle -A PREROUTING -p icmp -j DROP

 

### 7: Drop fragments in all chains ###

iptables -t mangle -A PREROUTING -f -j DROP

 

### 8: Limit connections per source IP ###

iptables -A INPUT -p tcp -m connlimit --connlimit-above 111 -j REJECT --reject-with tcp-reset

 

### 9: Limit RST packets ###

iptables -A INPUT -p tcp --tcp-flags RST RST -m limit --limit 2/s --limit-burst 2 -j ACCEPT

iptables -A INPUT -p tcp --tcp-flags RST RST -j DROP

 

### 10: Limit new TCP connections per second per source IP ###

iptables -A INPUT -p tcp -m conntrack --ctstate NEW -m limit --limit 60/s --limit-burst 20 -j ACCEPT

iptables -A INPUT -p tcp -m conntrack --ctstate NEW -j DROP

 

### 11: Use SYNPROXY on all ports (disables connection limiting rule) ###

# Hidden - unlock content above in "Mitigating SYN Floods With SYNPROXY" section

 

### SSH brute-force protection ###

iptables -A INPUT -p tcp --dport ssh -m conntrack --ctstate NEW -m recent --set

iptables -A INPUT -p tcp --dport ssh -m conntrack --ctstate NEW -m recent --update --seconds 60 --hitcount 10 -j DROP

 

### Protection against port scanning ###

iptables -N port-scanning

iptables -A port-scanning -p tcp --tcp-flags SYN,ACK,FIN,RST RST -m limit --limit 1/s --limit-burst 2 -j RETURN

iptables -A port-scanning -j DROP

 

# 80, 443 cloudflare only

iptables -t mangle -A PREROUTING -p tcp --dport 80 -s 173.245.48.0/20 -j ACCEPT

iptables -t mangle -A PREROUTING -p tcp --dport 80 -s 103.21.244.0/22 -j ACCEPT

iptables -t mangle -A PREROUTING -p tcp --dport 80 -s 103.22.200.0/22 -j ACCEPT

iptables -t mangle -A PREROUTING -p tcp --dport 80 -s 103.31.4.0/22 -j ACCEPT

iptables -t mangle -A PREROUTING -p tcp --dport 80 -s 141.101.64.0/18 -j ACCEPT

iptables -t mangle -A PREROUTING -p tcp --dport 80 -s 108.162.192.0/18 -j ACCEPT

iptables -t mangle -A PREROUTING -p tcp --dport 80 -s 190.93.240.0/20 -j ACCEPT

iptables -t mangle -A PREROUTING -p tcp --dport 80 -s 188.114.96.0/20 -j ACCEPT

iptables -t mangle -A PREROUTING -p tcp --dport 80 -s 197.234.240.0/22 -j ACCEPT

iptables -t mangle -A PREROUTING -p tcp --dport 80 -s 198.41.128.0/17 -j ACCEPT

iptables -t mangle -A PREROUTING -p tcp --dport 80 -s 162.158.0.0/15 -j ACCEPT

iptables -t mangle -A PREROUTING -p tcp --dport 80 -s 104.16.0.0/12 -j ACCEPT

iptables -t mangle -A PREROUTING -p tcp --dport 80 -s 172.64.0.0/13 -j ACCEPT

iptables -t mangle -A PREROUTING -p tcp --dport 80 -s 131.0.72.0/22 -j ACCEPT

iptables -t mangle -A PREROUTING -p tcp --dport 80 -j DROP

 

ip6tables -t mangle -A PREROUTING -p tcp --dport 80 -s 2400:cb00::/32 -j ACCEPT

ip6tables -t mangle -A PREROUTING -p tcp --dport 80 -s 2606:4700::/32 -j ACCEPT

ip6tables -t mangle -A PREROUTING -p tcp --dport 80 -s 2803:f800::/32 -j ACCEPT

ip6tables -t mangle -A PREROUTING -p tcp --dport 80 -s 2405:b500::/32 -j ACCEPT

ip6tables -t mangle -A PREROUTING -p tcp --dport 80 -s 2405:8100::/32 -j ACCEPT

ip6tables -t mangle -A PREROUTING -p tcp --dport 80 -s 2a06:98c0::/29 -j ACCEPT

ip6tables -t mangle -A PREROUTING -p tcp --dport 80 -s 2c0f:f248::/32 -j ACCEPT

ip6tables -t mangle -A PREROUTING -p tcp --dport 80 -j DROP

 

iptables -t mangle -A PREROUTING -p tcp --dport 443 -s 173.245.48.0/20 -j ACCEPT

iptables -t mangle -A PREROUTING -p tcp --dport 443 -s 103.21.244.0/22 -j ACCEPT

iptables -t mangle -A PREROUTING -p tcp --dport 443 -s 103.22.200.0/22 -j ACCEPT

iptables -t mangle -A PREROUTING -p tcp --dport 443 -s 103.31.4.0/22 -j ACCEPT

iptables -t mangle -A PREROUTING -p tcp --dport 443 -s 141.101.64.0/18 -j ACCEPT

iptables -t mangle -A PREROUTING -p tcp --dport 443 -s 108.162.192.0/18 -j ACCEPT

iptables -t mangle -A PREROUTING -p tcp --dport 443 -s 190.93.240.0/20 -j ACCEPT

iptables -t mangle -A PREROUTING -p tcp --dport 443 -s 188.114.96.0/20 -j ACCEPT

iptables -t mangle -A PREROUTING -p tcp --dport 443 -s 197.234.240.0/22 -j ACCEPT

iptables -t mangle -A PREROUTING -p tcp --dport 443 -s 198.41.128.0/17 -j ACCEPT

iptables -t mangle -A PREROUTING -p tcp --dport 443 -s 162.158.0.0/15 -j ACCEPT

iptables -t mangle -A PREROUTING -p tcp --dport 443 -s 104.16.0.0/12 -j ACCEPT

iptables -t mangle -A PREROUTING -p tcp --dport 443 -s 172.64.0.0/13 -j ACCEPT

iptables -t mangle -A PREROUTING -p tcp --dport 443 -s 131.0.72.0/22 -j ACCEPT

iptables -t mangle -A PREROUTING -p tcp --dport 443 -j DROP

 

ip6tables -t mangle -A PREROUTING -p tcp --dport 443 -s 2400:cb00::/32 -j ACCEPT

ip6tables -t mangle -A PREROUTING -p tcp --dport 443 -s 2606:4700::/32 -j ACCEPT

ip6tables -t mangle -A PREROUTING -p tcp --dport 443 -s 2803:f800::/32 -j ACCEPT

ip6tables -t mangle -A PREROUTING -p tcp --dport 443 -s 2405:b500::/32 -j ACCEPT

ip6tables -t mangle -A PREROUTING -p tcp --dport 443 -s 2405:8100::/32 -j ACCEPT

ip6tables -t mangle -A PREROUTING -p tcp --dport 443 -s 2a06:98c0::/29 -j ACCEPT

ip6tables -t mangle -A PREROUTING -p tcp --dport 443 -s 2c0f:f248::/32 -j ACCEPT

ip6tables -t mangle -A PREROUTING -p tcp --dport 443 -j DROP