| ▲ | gerdesj 8 hours ago | |||||||||||||||||||
I fail to understand how your approach is different to your parent. perf is a shell tool. iptables is a shell tool. sshguard is a log reader and ultimately you will use the CLI to take action. If you are advocating newer tools, look into nft - iptables is sooo last decade 8) I've used the lot: ipfw, ipchains, iptables and nftables. You might also try fail2ban - it is still worthwhile even in the age of the massively distributed botnet, and covers more than just ssh. I also recommend a VPN and not exposing ssh to the wild. Finally, 13,000 address in an ipset is nothing particularly special these days. I hope sshguard is making a properly optimised ipset table and that you running appropriate hardware. My home router is a pfSense jobbie running on a rather elderly APU4 based box and it has over 200,000 IPs in its pfBlocker-NG IP block tables and about 150,000 records in its DNS tables. | ||||||||||||||||||||
| ▲ | ValdikSS 8 hours ago | parent [-] | |||||||||||||||||||
>perf is a shell tool. iptables is a shell tool. sshguard is a log reader and ultimately you will use the CLI to take action. Well yes, and to be honest in this case I did that all over SSH: run `perf`, generate flame graph, copy the .svg to the PC over SFTP, open it in the file viewer. What I really wanted is a web interface which will just show me EVERYTHING it knows about the system in a form of charts, graphs, so I can just skim through it and check if everything allright visually, without using the shell and each individual command. Take a look at Netflix presentation, especially on their web interface screenshots: https://archives.kernel-recipes.org/wp-content/uploads/2025/... >look into nft - iptables is sooo last decade It doesn't matter in this context: iptables is using new netfilter (I'm not using iptables-legacy), and this exact scenario is 100% possible with native netfilter nft. >Finally, 13,000 address in an ipset is nothing particularly special these days Oh, the other day I had just 70 `iptables -m set --match-set` rules, and did you know how apparently inefficient source/destination address hashing algorithm for the set match is?! It was debugged with perf as well, but I wish I just had it as a dashboard picture from the start. I'm talking about ~4Gbit/s sudden limitation on a 10Gbit link. | ||||||||||||||||||||
| ||||||||||||||||||||