Just wondered if any one is using block lists for their docker containers.

IPSum publishes a great list of IPs worth blocking.

The thing is, I know docker networking interacts with iptables in a complex way such that the iptables INPUT chain is ignored.

The docker docs say you can put custom rules in DOCKER-USER chain, but my iptables knowledge isn’t great and I think I’m more likely to mess something up than to have any success.

The thing is, I’m sure that this is something loads of other people have encountered, and I’m sure there must be an easier way.

    • fine_sandy_bottom@discuss.tchncs.deOP
      link
      fedilink
      English
      arrow-up
      0
      ·
      5 months ago

      Thank you. I was looking at something like this.

      I guess I was asking whether there’s a package or project which kinda creates this rule and keeps the ipset list updated.

      If I create a rule like that, then next time I’m playing around with this I’m not going to be able to figure out what I’ve done.

      • Matt The Horwood@lemmy.horwood.cloud
        link
        fedilink
        English
        arrow-up
        2
        ·
        5 months ago

        I would have a cron that runs a script to pull the list and update IPset, this might not work.

        make a file on your docker server with the below in it, set the file to execute chmod +x file.sh

        #!/bin/sh
        ipset -q flush ipsum
        ipset -q create ipsum hash:ip
        for ip in $(curl --compressed https://raw.githubusercontent.com/stamparm/ipsum/master/ipsum.txt 2>/dev/null | grep -v "#" | grep -v -E "\s[1-2]$" | cut -f 1); do ipset add ipsum $ip; done
        iptables -D INPUT -m set --match-set ipsum src -j DROP 2>/dev/null
        iptables -I INPUT -m set --match-set ipsum src -j DROP
        

        Then add a cron file in /etc/cron.d that runs the script every 24 hours

        10 3 * * * root /root/file.sh