Hi,

I have a script that downloads "badhosts" from a site that continuously updates through a distrubed network.

I currently limit my blocklist to 450,000 ip addresses.

real mem = 4261072896 (4063MB)
avail mem = 4119322624 (3928MB)
bios0: PC Engines apu2



-pa-r-- blocklist
        Addresses:   450000
        Cleared:     Tue May 26 18:45:08 2020
        References:  [ Anchors: 0                  Rules: 1                  ]         Evaluations: [ NoMatch: 3794791            Match: 1172204            ]         In/Block:    [ Packets: 1172204            Bytes: 61337613           ]         In/Match:    [ Packets: 0                  Bytes: 0                  ]         In/Pass:     [ Packets: 0                  Bytes: 0                  ]         In/XPass:    [ Packets: 0                  Bytes: 0                  ]         Out/Block:   [ Packets: 0                  Bytes: 0                  ]         Out/Match:   [ Packets: 0                  Bytes: 0                  ]         Out/Pass:    [ Packets: 0                  Bytes: 0                  ]         Out/XPass:   [ Packets: 0                  Bytes: 0                  ]


Cheers,
Steve W.

On 12/08/2020 6:11 a.m., Alan McKay wrote:
Hey folks,

This is one that is difficult to test in a test environment.

I've got OpenBSD 6.5 on a relatively new pair of servers each with 8G RAM.

With some scripting I'm looking at feeding block IPs to the firewalls
to block bad-guys in near real time, but in theory if we got attacked
by a bot net or something like that, it could result in a few thousand
IPs being blocked.  Possibly even 10s of thousands.

Are there any real-world data out there on how big of a block list we
can handle without impacting performance?

We're doing the standard /etc/blacklist to load a table and then have
a block on the table right at the top of the ruleset.

thanks,
-Alan


Reply via email to