B Prevent Denial-of-Service Attacks
Use a script to configure input rules for the iptables service to watch for and prevent Denial-of-Service (DoS) on STA.
Note:
This procedure is optional and is provided as information only. Site security must be handled by a qualified security administrator.
The script defines input rules for the iptables service to block hosts based on any of the following criteria:
- Ethernet interface
- Ethernet protocol
- Port number
- Maximum number of requests within a specified time period
For STA, Oracle recommends attaching rules to UDP port 162 (the port on which SNMP traps are received) and on the ports you have defined for the STA managed servers. See the STA Installation and Configuration Guide for details about the ports.
-
Configure and verify the library connections on STA. See the STA Installation and Configuration Guide for details on testing the SNMP connection.
-
Log in to the STA server as the system root user.
-
Copy the contents of the following script example into a text editor.
# The name of the iptable chain CHAIN=INPUT # The ethernet interface to watch for attacks INTERFACE=eth0 # The port number to watch for attacks PORT=80 # The protocol (tcp or udp) PROTO=tcp # A server that sends HITS number of requests within TIME seconds will be blocked HITS=8 TIME=60 # Log filtered IPs to file touch /var/log/iptables.log grep iptables /etc/syslog.conf 1>/dev/null 2>&1 if [$? -ne 0 ]; then echo kern.warning /var/log/iptables.log >> /etc/syslog.conf echo touch /var/log/iptables.log >> /etc/syslog.conf /etc/init.d/syslog restart fi # Undo any previous chaining for this combination of chain, proto, hits, and time /sbin/iptables -L $CHAIN |grep $PROTO |grep $HITS |grep $TIME 1>/dev/null 2>&1 if [$? -eq 0 ]; then R=0 while [$R -eq 0 ]; do /sbin/iptables -D $CHAIN 1 1>/dev/null 2>&1 R=$? done fi # Logging rule /sbin/iptables --append $CHAIN --jump LOG --log-level 4 # Interface rule /sbin/iptables --insert $CHAIN --proto $PROTO --dport $PORT --in-interface $INTERFACE --match state --state NEW --match recent --set # Blocking rule /sbin/iptables --insert $CHAIN --proto $PROTO --dport $PORT --in-interface $INTERFACE --match state --state NEW --match recent --update --seconds $TIME --hitcount $HITS --jump DROP
-
Modify the following variables as appropriate for your environment.
-
INTERFACE
—Ethernet interface to watch for attacks (Eth0, for example) -
PROTO
—Ethernet protocol to watch for attacks (TCP or UDP) -
PORT
—Port number to watch for attacks -
HITS
andTIME
—Specify reasonable values for the number of requests (HITS
) within a given time period, in seconds (TIME
). Any host that exceeds the number of requests within the specified time period is blocked from further connections for the remainder of the period.
-
-
Save the script and execute it. The new rules are added to the iptables service and take effect immediately.
-
Verify that STA is still successfully monitoring your libraries.