Applying P2P iptables
iptables is a utility that allows system admins to configure IP packet filtering rules for Linux’s kernel firewall. These rules are organized in separate tables and determine how to treat network packets. Using iptables is highly recommended and shouldn’t be overlooked unless required by your system’s architecture and/or you’re aware of the security implications.
Warning
Using iptables is highly recommended. Be aware that Mainsail can implement multiple API endpoints, and you should consider applying the iptables script to each of them.
The iptables Script
The iptables script offers additional protection for Mainsail and Mainsail API nodes by using standard firewall tools to rate-limit certain connections.
Specifically:
- Parallel/simultaneous P2P connections are restricted to a total of 10 per IP address; this number can be adjusted using the
P2P_GLOBAL_CONN
script variable. - Global connections are limited to 4 NEW connections per 30-second interval.
Script Usage
Command | Execution |
---|---|
start | bash p2p-iptables.sh start |
stop | bash p2p-iptables.sh stop |
restart | bash p2p-iptables.sh restart |
status | bash p2p-iptables.sh status |
Running the Script
Download and execute the iptables script using the following commands:
1wget -N https://raw.githubusercontent.com/ArkEcosystem/mainsail/main/scripts/p2p-iptables.sh
Edit the iptables script an use correct settings.
1nano ./p2p-iptables.sh
Enable iptables:
1bash ./p2p-iptables.sh start
Configuration
Edit the iptables script an review setting.
1nano ./p2p-iptables.sh
Option | Description |
---|---|
P2P_GLOBAL | Provide correct p2p PORT number. Correct setting might be different than default value. |
P2P_GLOBAL_CONN | Number of connection when the 4 connections per 30 seconds limit is activated. |
DOCKER | Set to true if docker image is used. |
Creating a cron job
Because the filtering initiated by the iptables script does not persist after a system reboot, you should also consider adding the script to a cron job.
-
edit the crontab file (choose the ‘nano’ editor when prompted):
1crontab -e -
add the following line to the end of the crontab file:
1@reboot bash ~/p2p-iptables.sh start -
save the changes and exit:
1ctrl + x23# press 'y' then 'enter' to confirm -
apply the permissions:
1sudo bash -c "echo \"$USER ALL=(ALL) NOPASSWD:/sbin/p2p-iptables\" >> /etc/sudoers"
Warning
Failing to apply permissions will prevent the iptables script from executing after a system reboot.