-
-
Save ixqbar/3d625eb75f252f9ecd2ef69b0559d589 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
-- a quick LUA access script for nginx to check IP addresses against an | |
-- `ip_blacklist` set in Redis, and if a match is found send a HTTP 403. | |
-- | |
-- allows for a common blacklist to be shared between a bunch of nginx | |
-- web servers using a remote redis instance. lookups are cached for a | |
-- configurable period of time. | |
-- | |
-- block an ip: | |
-- redis-cli SADD ip_blacklist 10.1.1.1 | |
-- remove an ip: | |
-- redis-cli SREM ip_blacklist 10.1.1.1 | |
-- | |
-- also requires lua-resty-redis from: | |
-- https://github.com/agentzh/lua-resty-redis | |
-- | |
-- your nginx http context should contain something similar to the | |
-- below: (assumes resty/redis.lua exists in /etc/nginx/lua/) | |
-- | |
-- lua_package_path "/etc/nginx/lua/?.lua;;"; | |
-- lua_shared_dict ip_blacklist 1m; | |
-- | |
-- you can then use the below (adjust path where necessary) to check | |
-- against the blacklist in a http, server, location, if context: | |
-- | |
-- access_by_lua_file /etc/nginx/lua/ip_blacklist.lua; | |
-- | |
-- from https://gist.github.com/chrisboulton/6043871 | |
-- modify by Ceelog | |
local redis_host = "your.redis.server.here" | |
local redis_port = 6379 | |
-- connection timeout for redis in ms. don't set this too high! | |
local redis_connection_timeout = 100 | |
-- check a set with this key for blacklist entries | |
local redis_key = "ip_blacklist" | |
-- cache lookups for this many seconds | |
local cache_ttl = 60 | |
-- end configuration | |
local ip = ngx.var.remote_addr | |
local ip_blacklist = ngx.shared.ip_blacklist | |
local last_update_time = ip_blacklist:get("last_update_time"); | |
-- only update ip_blacklist from Redis once every cache_ttl seconds: | |
if last_update_time == nil or last_update_time < ( ngx.now() - cache_ttl ) then | |
local redis = require "resty.redis"; | |
local red = redis:new(); | |
red:set_timeout(redis_connect_timeout); | |
local ok, err = red:connect(redis_host, redis_port); | |
if not ok then | |
ngx.log(ngx.DEBUG, "Redis connection error while retrieving ip_blacklist: " .. err); | |
else | |
local new_ip_blacklist, err = red:smembers(redis_key); | |
if err then | |
ngx.log(ngx.DEBUG, "Redis read error while retrieving ip_blacklist: " .. err); | |
else | |
-- replace the locally stored ip_blacklist with the updated values: | |
ip_blacklist:flush_all(); | |
for index, banned_ip in ipairs(new_ip_blacklist) do | |
ip_blacklist:set(banned_ip, true); | |
end | |
-- update time | |
ip_blacklist:set("last_update_time", ngx.now()); | |
end | |
end | |
end | |
if ip_blacklist:get(ip) then | |
ngx.log(ngx.DEBUG, "Banned IP detected and refused access: " .. ip); | |
return ngx.exit(ngx.HTTP_FORBIDDEN); | |
end |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment