Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/jgmdev/ddos-deflate
Fork of DDoS Deflate with fixes, improvements and new features.
https://github.com/jgmdev/ddos-deflate
attacks blocking daemon ddos dos ipv4 ipv6 shell
Last synced: 11 days ago
JSON representation
Fork of DDoS Deflate with fixes, improvements and new features.
- Host: GitHub
- URL: https://github.com/jgmdev/ddos-deflate
- Owner: jgmdev
- License: other
- Created: 2015-01-08T01:36:10.000Z (almost 10 years ago)
- Default Branch: master
- Last Pushed: 2021-10-14T18:59:01.000Z (about 3 years ago)
- Last Synced: 2024-08-01T09:25:07.015Z (3 months ago)
- Topics: attacks, blocking, daemon, ddos, dos, ipv4, ipv6, shell
- Language: Shell
- Homepage:
- Size: 166 KB
- Stars: 757
- Watchers: 70
- Forks: 264
- Open Issues: 19
-
Metadata Files:
- Readme: README.md
- Changelog: ChangeLog
- License: LICENSE
Awesome Lists containing this project
README
# DDoS Deflate
Fork of DDoS Deflate on now inexistent http://deflate.medialayer.com/
([MediaLayer went out of business](http://www.webhostingtalk.com/showthread.php?t=1494121&highlight=medialayer))
with fixes, improvements and new features.**Original Author:** Zaf (Copyright (C) 2005)
**Maintainer:** Jefferson González
**Contributor (BSD support):** Marc S. Brooks
## About
(D)DoS Deflate is a lightweight bash shell script designed to assist in
the process of blocking a denial of service attack. It utilizes the
command below to create a list of IP addresses connected to the server,
along with their total number of connections. It is one of the simplest
and easiest to install solutions at the software level.ss -Hntu | awk '{print $6}' | sort | uniq -c | sort -nr
IP addresses with over a pre-configured number of connections are
automatically blocked in the server's firewall, which can be direct
ipfw, iptables, or Advanced Policy Firewall (APF).### Notable Features
* IPv6 support.
* It is possible to whitelist IP addresses, via /etc/ddos/ignore.ip.list.
* It is possible to whitelist hostnames, via /etc/ddos/ignore.host.list.
* IP ranges and CIDR syntax is supported on /etc/ddos/ignore.ip.list
* Simple configuration file: /etc/ddos/ddos.conf
* IP addresses are automatically unblocked after a preconfigured time limit (default: 600 seconds)
* The script can run as a cron job at chosen frequency via the configuration file (default: 1 minute)
* The script can run as a daemon at chosen frequency via the configuration file (default: 5 seconds)
* You can receive email alerts when IP addresses are blocked.
* Control blocking by connection state (see man ss or man nestat).
* Auto-detection of firewall.
* Support for APF, CSF, ipfw, and iptables.
* Logs events to /var/log/ddos.log
* Can ban only incoming connections or by specific port rules.
* Option to reduce transfer speed for IP addresses that reach certain limit using iftop and tc.
* Uses tcpkill to reduce the amount of processes opened by attackers.
* Cloudflare support by using tcpdump to get the real user ip and using iptables string matching to drop connections.## Dependencies
The installation script has some support to automatically install the required dependencies but, it may fail to install some or all of them. You may want to manually install the required dependencies before proceeding to installation as listed below on the subsection of your linux distro.
## Ubuntu/Debian
```shell
sudo apt install dnsutils
sudo apt-get install net-tools
sudo apt-get install tcpdump
sudo apt-get install dsniff -y
sudo apt install grepcidr
```
## InstallationAs root user execute the following commands:
```shell
wget https://github.com/jgmdev/ddos-deflate/archive/master.zip -O ddos.zip
unzip ddos.zip
cd ddos-deflate-master
./install.sh
```## Uninstallation
As root user execute the following commands:
```shell
cd ddos-deflate-master
./uninstall.sh
```## Usage
The installer will automatically detect if your system supports
init.d scripts, systemd services or cron jobs. If one of them is found
it will install apropiate files and start the ddos script. In the
case of init.d and systemd the ddos script is started as a daemon,
which monitoring interval is set at 5 seconds by default. The daemon
is much faster detecting attacks than the cron job since cron's are
capped at 1 minute intervals.Once you hava (D)Dos deflate installed proceed to modify the config
files to fit your needs.**/etc/ddos/ignore.host.list**
On this file you can add a list of host names to be whitelisted, for
example:> googlebot.com
> my-dynamic-ip.somehost.com**/etc/ddos/ignore.ip.list**
On this file you can add a list of ip addresses to be whitelisted, for
example:> 12.43.63.13
> 165.123.34.43-165.123.34.100
> 192.168.1.0/24
> 129.134.131.2**/etc/ddos/ddos.conf**
The behaviour of the ddos script is modified by this configuration file.
For more details see **man ddos** which has documentation of the
different configuration options.After you modify the config files you will need to restart the daemon.
If running on systemd:> systemctl restart ddos
If running as classical init.d script:
> /etc/init.d/ddos restart
> or
> service ddos restartWhen running the script as a cronjob no restarting is required.
## CLI Usage
**ddos** [OPTIONS] [N]
*N : number of tcp/udp connections (default 150)*
#### OPTIONS
**-h | --help:**
Show the help screen.
**-c | --cron:**
Create cron job to run the script regularly (default 1 mins).
**-i | --ignore-list:**
List whitelisted ip addresses.
**-b | --bans-list:**
List currently banned ip addresses.
**-u | --unban:**
Unbans a given ip address.
**-d | --start:**
Initialize a daemon to monitor connections.
**-s | --stop:**
Stop the daemon.
**-t | --status:**
Show status of daemon and pid if currently running.
**-v[4|6] | --view [4|6]:**
Display active connections to the server.
**-y[4|6] | --view-port [4|6]:**
Display active connections to the server including the port.
**-k | --kill:**
Block all ip addresses making more than N connections.