can iptables or BPF be used to detect and drop replay attack traffic?

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP











up vote
0
down vote

favorite












I would like to drop traffic that is 'old' and 'seen before' i.e replay attack. For example if someone uses tcpdump/wireshark to capture a 5min chunk of data and replays it in loop. The traffic is valid in that its payload conforms to what the server expects and destination is valid service port. But if it's old and see before i want to drop it before it reaches the server.



Can this be done with iptables/bpf ?



Using a the packets signature or timestamp field perhaps or marking the packet and storing in conntrack for some time which is checked etc...



Before going down the userspace or kernel module path i wanted to check if this can be done now.



thanks.









share

























    up vote
    0
    down vote

    favorite












    I would like to drop traffic that is 'old' and 'seen before' i.e replay attack. For example if someone uses tcpdump/wireshark to capture a 5min chunk of data and replays it in loop. The traffic is valid in that its payload conforms to what the server expects and destination is valid service port. But if it's old and see before i want to drop it before it reaches the server.



    Can this be done with iptables/bpf ?



    Using a the packets signature or timestamp field perhaps or marking the packet and storing in conntrack for some time which is checked etc...



    Before going down the userspace or kernel module path i wanted to check if this can be done now.



    thanks.









    share























      up vote
      0
      down vote

      favorite









      up vote
      0
      down vote

      favorite











      I would like to drop traffic that is 'old' and 'seen before' i.e replay attack. For example if someone uses tcpdump/wireshark to capture a 5min chunk of data and replays it in loop. The traffic is valid in that its payload conforms to what the server expects and destination is valid service port. But if it's old and see before i want to drop it before it reaches the server.



      Can this be done with iptables/bpf ?



      Using a the packets signature or timestamp field perhaps or marking the packet and storing in conntrack for some time which is checked etc...



      Before going down the userspace or kernel module path i wanted to check if this can be done now.



      thanks.









      share













      I would like to drop traffic that is 'old' and 'seen before' i.e replay attack. For example if someone uses tcpdump/wireshark to capture a 5min chunk of data and replays it in loop. The traffic is valid in that its payload conforms to what the server expects and destination is valid service port. But if it's old and see before i want to drop it before it reaches the server.



      Can this be done with iptables/bpf ?



      Using a the packets signature or timestamp field perhaps or marking the packet and storing in conntrack for some time which is checked etc...



      Before going down the userspace or kernel module path i wanted to check if this can be done now.



      thanks.







      security iptables firewall netfilter





      share












      share










      share



      share










      asked 2 mins ago









      Flo Woo

      13315




      13315

























          active

          oldest

          votes











          Your Answer







          StackExchange.ready(function()
          var channelOptions =
          tags: "".split(" "),
          id: "106"
          ;
          initTagRenderer("".split(" "), "".split(" "), channelOptions);

          StackExchange.using("externalEditor", function()
          // Have to fire editor after snippets, if snippets enabled
          if (StackExchange.settings.snippets.snippetsEnabled)
          StackExchange.using("snippets", function()
          createEditor();
          );

          else
          createEditor();

          );

          function createEditor()
          StackExchange.prepareEditor(
          heartbeatType: 'answer',
          convertImagesToLinks: false,
          noModals: false,
          showLowRepImageUploadWarning: true,
          reputationToPostImages: null,
          bindNavPrevention: true,
          postfix: "",
          onDemand: true,
          discardSelector: ".discard-answer"
          ,immediatelyShowMarkdownHelp:true
          );



          );













           

          draft saved


          draft discarded


















          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f475209%2fcan-iptables-or-bpf-be-used-to-detect-and-drop-replay-attack-traffic%23new-answer', 'question_page');

          );

          Post as a guest



































          active

          oldest

          votes













          active

          oldest

          votes









          active

          oldest

          votes






          active

          oldest

          votes















           

          draft saved


          draft discarded















































           


          draft saved


          draft discarded














          StackExchange.ready(
          function ()
          StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f475209%2fcan-iptables-or-bpf-be-used-to-detect-and-drop-replay-attack-traffic%23new-answer', 'question_page');

          );

          Post as a guest













































































          Popular posts from this blog

          How to check contact read email or not when send email to Individual?

          Bahrain

          Postfix configuration issue with fips on centos 7; mailgun relay