Geoblock
VPS
I've been dealing with constant attacks on a mail server on a VPS coming from 2 specific countries, the only solution that worked was completely blocking these countries.
There are 2 popular geoblock providers, Maxmind and DP-IP, we can utilize them using a python library called geoipsets.
Installation
Install the following packages:
sudo apt install python3 python3.12 python3-pip python3-venv ipset
Create a python virtual environment:
python3 -m venv .venv
Verify that it works:
source .venv/bin/activate
Geoblock Config
Create a geoblock config according to the geoipsets documentation.
For example /home/user/geoipsets.conf
:
[general]
provider=dbip
firewall=iptables
address-family=ipv4,ipv6
[countries]
RU
CN
Verify that it works:
source .venv/bin/activate
geoipsets -o /home/user -c /home/user/geoipsets.conf
Geoblock Script
Create a script to refresh the geoblock ipsets and recreate the iptables rules.
For example /home/user/geoblock.sh
:
#!/bin/bash
output_path="/home/user"
venv_path="/home/user/.venv/bin/activate"
config_path="/home/user/geoipsets.conf"
log="/home/user/geoblock.log"
echo "Updating Blocklist $(date)" >> $log
source $venv_path
geoipsets -o $output_path -c $config_path >> $log
for i in $(find "${output_path}/geoipsets" -name "*.ipv*");
do
name=$(basename $i)
echo $name >> $log
/usr/sbin/ipset flush $name >> $log
/usr/sbin/ipset restore --exist --file $i >> $log
command=$(if [[ $name == *ipv4 ]]; then echo "/usr/sbin/iptables"; else echo "/usr/sbin/ip6tables"; fi)
$command -D FORWARD -m set --match-set $name src -j DROP &>/dev/null
$command -D INPUT -m set --match-set $name src -j DROP &>/dev/null
$command -D DOCKER-USER -m set --match-set $name src -j DROP &>/dev/null
$command -I DOCKER-USER 1 -m set --match-set $name src -j DROP >> $log
$command -I INPUT 1 -m set --match-set $name src -j DROP >> $log
$command -I FORWARD 1 -m set --match-set $name src -j DROP >> $log
done
Verify that it works and the ipsets have been filled:
chmod +x /home/user/geoblock.sh
sudo /home/user/geoblock.sh
sudo ipset list RU.ipv4
Cron Scheduling
Warning - make sure you're not accidentally blocking your own access to the VPS before proceeding.
Run the geoblock script on reboot and weekly.
For example, add the following to sudo crontab -e
:
20 0 * * 2 /home/user/geoblock.sh
@reboot sleep 120 && /home/user/geoblock.sh
Verify that it runs on reboot and weekly. There's a 2 minute delay before it applies after reboots, to give you enough time to fix a lockout.
OPNSense
Alias
Navigate to Firewall > Aliases > GeoIP settings and add a link to a geoblock database with your license key:
https://download.maxmind.com/app/geoip_download?edition_id=GeoLite2-Country-CSV&license_key=your-license-key&suffix=zip
Navigate to Firewall > Aliases and create aliases with the countries you want to block or whitelist a specific country:
Name: Geoblock
Type: GeoIP (IPv4, IPv6)
Content: Select all the countries you want to block
Name: UK
Type: GeoIP (IPv4, IPv6)
Content: Select UK
Firewall
Navigate to Firewall > Rules > WAN and create firewall rules:
Action: Block
Interface: WAN
Direction: in
TCP/IP Version: IPv4+IPv6
Protocol: any
Source: Geoblock
Destination: any
Description: Blocks specific countries
Action: Pass
Interface: WAN
Direction: in
TCP/IP Version: IPv4+IPv6
Protocol: TCP
Source: UK
Destination: WAN address
Destination port range: 443
Description: Whitelist UK on port 443
Cron
Create a cron job to automatically update the blocklists every day.
Navigate to System > Settings > Cron and add the following job:
Eabled: checked
Minutes: 0
Hours: 0
Day of the month: *
Months: *
Days of the week: *
Command: Update and reload firewall aliases