2019
DOI: 10.1145/3371927.3371929
|View full text |Cite
|
Sign up to set email alerts
|

Securing Linux with a faster and scalable iptables

Abstract: The sheer increase in network speed and the massive deployment of containerized applications in a Linux server has led to the consciousness that iptables, the current de-facto firewall in Linux, may not be able to cope with the current requirements particularly in terms of scalability in the number of rules. This paper presents an eBPF-based firewall, bpf-iptables, which emulates the iptables filtering semantic while guaranteeing higher throughput. We compare our implementation against the current version of i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
3

Relationship

2
8

Authors

Journals

citations
Cited by 36 publications
(12 citation statements)
references
References 10 publications
0
12
0
Order By: Relevance
“…The NAT is an eBPF re-implementation of the corresponding Linux Netfilter application, configured with a single two-way SNAT/masquerading rule: the source IP of every packet is replaced with the IP of the outgoing NAT port and a separate L4 source port is allocated for each new flow. BPF-iptables is an eBPF/XDP clone [67] of the well-known Linux iptables framework, configured with 5-tuple rules generated by Classbench [93]. We used the Classbench trace generator [92] to generate packets matching the created rule set using a Pareto cumulative density function to control the locality of reference.…”
Section: Discussionmentioning
confidence: 99%
“…The NAT is an eBPF re-implementation of the corresponding Linux Netfilter application, configured with a single two-way SNAT/masquerading rule: the source IP of every packet is replaced with the IP of the outgoing NAT port and a separate L4 source port is allocated for each new flow. BPF-iptables is an eBPF/XDP clone [67] of the well-known Linux iptables framework, configured with 5-tuple rules generated by Classbench [93]. We used the Classbench trace generator [92] to generate packets matching the created rule set using a Pareto cumulative density function to control the locality of reference.…”
Section: Discussionmentioning
confidence: 99%
“…The NAT is an eBPF re-implementation of the corresponding Linux Netfilter application, configured with a single two-way SNAT/ masquerading rule: the source IP of every packet is replaced with the IP of the outgoing NAT port and a separate L4 source port is allocated for each new flow. BPF-iptables is an eBPF/XDP clone [60] of the well-known Linux iptables framework, configured with 500 wildcard 5-tuple rules generated by Classbench [85]. Finally, Katran [40] was configured as a web-frontend, with 10 TCP services/VIPs and 100 backend servers for each VIP.…”
Section: Discussionmentioning
confidence: 99%
“…Packet classifiers are often accompanied by caching systems that provide some adjustability to traffic. Due to its simplicity, a linear lookup structure is commonly applied in practice, e.g., in the default firewall suite of the Linux operating system kernel called iptables [21], the OpenFlow reference switch [24], and in many QoS classifiers.…”
Section: Related Workmentioning
confidence: 99%