-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[RFE] Documentation on how to configure nftables for basic https and ssh #1333
Comments
Also do not see this config file either
|
This issue may actually be a request to finish implementing nftables? |
Increase IPTables capabilitiesIncrease block list from 100 to 10000. https://ipset.netfilter.org/iptables-extensions.man.html
|
Hello @bignay2000 , thanks for reaching out! Our docs are in markdown (we use Hugo for generating HTML) and are here: https://github.com/flatcar/flatcar-website . Instructions on how to add content and to check with a local Hugo are included in the repo. |
We had a tracking issue for this: #900 |
Current situation
Currently I have been using IPTables on a Digital Ocean server (1 vCPU, 1 GB Ram, Premium AMD droplet) for a few years and update weekly to the latest Flatcar Stable release. I think out of the box IPtables only keeps a ban list of 100 IPs, which I think is insufficient to protect against bot networks in 2024.
While the server is a small digital ocean droplet, I think it would be able to handle increased security. Some research points me to /sys/module/xt_recent/parameters/ip_list_tot & /sys/module/xt_recent/parameters/ip_pkt_list_tot files, but not sure how to modify these within flatcar's read only system on an existing system or how to write the ignition file. Also need changes to persist between reboots and updates.
https://www.flatcar.org/releases#release-3510.2.0 migrated iptables to nftables with backwards compatibility. So now I think it may be better to configure nftables.
Impact
Ensure the ability to handle a bot attack with more than 100 ip addresses used.
Ideal future situation
Flatcar add documentation webpage
Additional information
I do this procedure on my digital ocean boxes that have SSH and HTTPS:
IP Tables to protect Denial of Service and attacks on https and ssh
The text was updated successfully, but these errors were encountered: