2021-02-25 19:16:02 +01:00
# iblock
2021-02-25 20:43:58 +01:00
iblock is an inetd program adding the client IP to a Packet Filter table.
It is meant to be used to block scanner connecting on unused ports.
2021-02-28 16:58:50 +01:00
# How to use
2021-03-10 22:37:11 +01:00
## Configure inetd
2021-02-28 16:58:50 +01:00
Start inetd service with this in `/etc/inetd.conf` :
```
666 stream tcp nowait root /usr/local/bin/iblock iblock
2021-03-10 22:34:50 +01:00
666 stream tcp6 nowait root /usr/local/bin/iblock iblock
2021-02-28 16:58:50 +01:00
```
2021-03-10 22:37:11 +01:00
You can change the PF table by adding it as a parameter like this:
```
666 stream tcp nowait root /usr/local/bin/iblock iblock blocklist
666 stream tcp6 nowait root /usr/local/bin/iblock iblock blocklist
```
## Configure packet filter
2021-02-28 16:58:50 +01:00
Use this in `/etc/pf.conf` , choose which ports will trigger the ban from the variable:
```
# services triggering a block
2021-02-28 17:01:05 +01:00
blocking_tcp="{ 21 23 53 111 135 137:139 445 1433 25565 5432 3389 3306 27019 }"
2021-02-28 16:58:50 +01:00
table < blocked > persist
2021-02-28 17:03:59 +01:00
block in quick from < blocked > label iblock
2021-03-10 22:34:50 +01:00
pass in quick on egress inet proto tcp to port $blocking_tcp rdr-to 127.0.0.1 port 666
pass in quick on egress inet6 proto tcp to port $blocking_tcp rdr-to ::1 port 666
2021-02-28 16:58:50 +01:00
```
2021-03-10 22:37:11 +01:00
Don't forget to reload the rules with `pfctl -f /etc/pf.conf` .
# Get some statistics
Done! You can see IP banned using `pfctl -t blocked -T show` and iBlock will send blocked addresses to syslog.
2021-02-28 16:58:50 +01:00
2021-02-28 17:03:59 +01:00
In the example I added a label to the block rule, you can use `pfctl -s labels` to view statistics from this rule, [see documentation for column meaning ](https://man.openbsd.org/pfctl#s~8 ).
2021-02-28 16:58:50 +01:00
# TODO
- make install doing something
- A proper man page
- make it work with doas