IPV6 Class block trigger
Posted: 04 Aug 2012, 12:29
I have
LF_NETBLOCK_CLASS = C
It works perfectly for IPV4 but with IPV6 now being used more and more I've found this happening :-
: Network class C has been blocked
IP addresses that triggered the block
Sat Aug 4 00:46:03 2012 2a01:00c0:0002:0004:0216:3eff:fe0d:266d
Sat Aug 4 00:46:23 2012 2a02:2498:0001:003d:5054:00ff:fed3:e91a
Sat Aug 4 02:56:36 2012 2a01:00c0:0002:0004:0216:3eff:fe0d:266d
Sat Aug 4 02:57:06 2012 2a02:2498:0001:003d:5054:00ff:fed3:e91a
Sat Aug 4 11:20:06 2012 2a00:14f0:e000:74::2
I didn't think IPV6 had a sense of the legacy network classes. Also not sure how these are interpreted as a class C.
I know why these got blocked in the first place.
The first ones are attempts by the server to yum update using IPV6 and the kernel is Pre v2.6.20 (conn tracking ; see post -csf blocking some whois queries-)
The last one was a mistake on my part.
But would it not make more sense to give the NETBLOCK facility a LF_NETBLOCK_IPV6_SUBNET value.
Then we could set :-
LF_NETBLOCK_IPV6_SUBNET = 64
thereby blocking a /64 if the number of hits satisfy that.
Cheers,
Jim
LF_NETBLOCK_CLASS = C
It works perfectly for IPV4 but with IPV6 now being used more and more I've found this happening :-
: Network class C has been blocked
IP addresses that triggered the block
Sat Aug 4 00:46:03 2012 2a01:00c0:0002:0004:0216:3eff:fe0d:266d
Sat Aug 4 00:46:23 2012 2a02:2498:0001:003d:5054:00ff:fed3:e91a
Sat Aug 4 02:56:36 2012 2a01:00c0:0002:0004:0216:3eff:fe0d:266d
Sat Aug 4 02:57:06 2012 2a02:2498:0001:003d:5054:00ff:fed3:e91a
Sat Aug 4 11:20:06 2012 2a00:14f0:e000:74::2
I didn't think IPV6 had a sense of the legacy network classes. Also not sure how these are interpreted as a class C.
I know why these got blocked in the first place.
The first ones are attempts by the server to yum update using IPV6 and the kernel is Pre v2.6.20 (conn tracking ; see post -csf blocking some whois queries-)
The last one was a mistake on my part.
But would it not make more sense to give the NETBLOCK facility a LF_NETBLOCK_IPV6_SUBNET value.
Then we could set :-
LF_NETBLOCK_IPV6_SUBNET = 64
thereby blocking a /64 if the number of hits satisfy that.
Cheers,
Jim