iptables -I OUTPUT -p tcp -m string –string “qq.com” –algo bm -j DROP
iptables -I OUTPUT -p udp -m string –string “qq.com” –algo bm -j DROP
Iptables String Matching: A way to Enhanced Server Security and Advanced Firewalling
Introduction. When it comes to any server or network connected to the internet, security from malicious files and hack attempts is a big concern for any administrator. Linux provides its own firewall from the early releases itself. The current iptables firewall maintained by the netfilter team is advancing to more powerful security and network management tool with the recent releases.It will be a topic of interest for any linux based server/network administrator. This article covers effective configuration and optimization of the iptables firewall system in 2.6.x kernels in order to more effectively defend against TCP attacks and to drop unwanted packets without messing them up with your business critical services!!.
Kernels from 2.6 include support for matching strings present in IP packets, inspecting the entire packet data. Earlier kernels supported matching at the IP header level only, which was a limitation as the rules can only be formed based on header values like IP addresses, ports, packet state etc. The netfilter iptables firewall system has undergone great advancements in the latest kernels, with the modified string matching option being more interesting among them for server administrators. The rules, based on string matching functions, are very easy to implement. This guide intends to introduce the method to users with a basic understanding of networking and iptables.
System Requirements. Preferred kernel version : 2.6.18 or later.
The iptables program(1.3.5 or later) installed on your machine.
The kernel should be compiled with string matching support. To do this, the following line should be added to the .config file prior to compiling the kernel:CONFIG_NETFILTER_XT_MATCH_STRING=m
If you use a pre-complied kernel, check for this option in the config file with the appropriate version of the kernel in your /boot directory. If present, it means that netfilter string matching is compiled as a module. Make sure that the module is loaded (using the lsmod command or by looking for the appropriate entry in the/proc/modules file). The minimum requirement is a 2.6.14 kernel, however it is a bit difficult to get it working on kernels before 2.6.18. Customising the kernel and iptables is required in that case. Suggested configuration options for older kernels can be detailed in another article, if there is demand.
Formating the Rules. If iptables is installed with string matching support, its man page can be found with the following command:
iptables -m string -help
Here is the relevant section from the iptables(8) man page:
This modules matches a given string by using some
pattern matching strategy. It requires a linux kernel >= 2.6.14.
Select the pattern matching strategy. (bm = Boyer-
Moore, kmp = Knuth-Pratt-Morris)
Set the offset from which it starts looking for any
matching. If not passed, default is 0.
Set the offset to which it starts looking for any
matching. If not passed, default is the
Matches the given pattern. --hex-string pattern
Matches the given pattern in hex notation.
In iptables 1.3.5, you need to specify the algorithm to use for string matching using the –algo option. We can limit the search by specifying the offset values as well. There are two algorithms that can be used, Boyer-Moore and Knuth-Morris-Pratt. More information regarding these algorithms can be found at Wikipedia – for Boyer-Moore the URL is:
and for Knuth-Morris-Pratt the URL is:
Boyer-Moore is efficient and fast and is preferable in most cases.
Common Applications and Useful Example Rules: 1) To prevent an intrusion attempt. In case, when a suspecious URL upload using the webserver is detected, You could frame similar rules as follows.
iptables -I INPUT 1 -p tcp --dport 80 -m string --string "cmd.exe" --algo bm -j DROP
The rule blocks all packets to port 80 containing the string cmd.exe. Mod_security is an option for the same, but it can be an overload to your busy webservers.
2) To defend DDOS to a service. It is a common case where we need to drop requests to a domain URL when it is under DDOS. mod_dosevasive is an option, but it really overloads the webserver. String matching option can be utilized here without overloading the webserver.
iptables -I INPUT 1 -p tcp --dport 80 -m string --string "domain.com" --algo kmp -j DROP
The rule, blocks all web requests to domain.com. These rules can also be used in conjunction with other iptables matches and options depending on what is required.
3) To Defend against E-mail Spoofing. We can make use of the string matching option in numerous cases to drop intruder and spam packets before they enter the server. Another instance for example is, if the mail server is receiving many spoofed e-mails with a common ‘Subject’.If the spammer is using a unique IP address, it is very easy to block him using RBLs, conventional iptables rules etc. But when the spammer is using different IP addresses, it makes things difficult for the administrator.In such a case, the following string based rule can be added to the firewall so that the mail server will not get overloaded by the spoofed mails.
iptables -I INPUT -p tcp --dport 25 -m string --string "Subject" --algo bm -j DROP
**Do it now with an optimised rule! The same rule might be modified to one with less overhead (that is, it uses less resources) by limiting the search specifying offset values, and by assuming that the SMTP subject header will be within an offset limit of 15000 in the packet.
iptables -I INPUT -p tcp --dport 25 -m string --string "Subject" --algo bm --to 15000 -j DROP
4) Other general cases. Apart from the instances discussed above, you can make use of the string matching options, wherever you need to manage the packets entering a server or network,based on strings like URLs, file names, file contents etc.
Conclusion. The string matching option can be effectively utilized wherever a network needs to be filtered using strings. We can block the packets right at the kernel level itself without overloading your server applications. However, there is a higher overhead involved for the kernel with string matching, compared to other ordinary iptables matchings. Offset limits should be specified for searching wherever possible in order to reduce this overhead.
About me: I am Krishnakumar, Freelance Linux administrator and security expert for DC’s and webhosts. You can reach me at krishnakumarmec99[at]gmail[dot]com