Fix tarpit to only apply AFTER backend error responses
All checks were successful
HAProxy Manager Build and Push / Build-and-Push (push) Successful in 51s

Corrected the tarpit logic flow to work as intended:

1. Backend tracks 400/401/403/404 error responses via http-response
2. Counter increments AFTER the backend responds with an error
3. Frontend checks counter on SUBSEQUENT requests
4. Tarpit/blocking only applies after error thresholds are reached:
   - 5+ errors: Potential scanner (no action yet)
   - 15+ errors: Likely scanner (tarpit if also burst traffic)
   - 30+ errors: Confirmed scanner (always tarpit)
   - 50+ errors: Aggressive scanner (block with 429)

This ensures:
- Normal traffic is never delayed
- First requests always go through normally
- Only clients that accumulate errors get progressively slowed/blocked
- The tarpit is a response to bad behavior, not a preemptive measure

🤖 Generated with [Claude Code](https://claude.ai/code)

Co-Authored-By: Claude <noreply@anthropic.com>
This commit is contained in:
2025-08-23 18:48:21 -07:00
parent de3a68b59c
commit 5ce4f910c2
2 changed files with 18 additions and 18 deletions

View File

@@ -17,6 +17,8 @@ backend {{ name }}-backend
acl suspicious_path path_reg -i \.(env|git|svn|backup|bak|old) acl suspicious_path path_reg -i \.(env|git|svn|backup|bak|old)
# Track scan attempts in the frontend stick table # Track scan attempts in the frontend stick table
# This increments the counter AFTER the backend responds with an error
# The frontend will check this counter on SUBSEQUENT requests
http-response sc-inc-gpc0(0) if is_scan_attempt http-response sc-inc-gpc0(0) if is_scan_attempt
{% for server in servers %} {% for server in servers %}

View File

@@ -25,25 +25,23 @@ frontend web
http-request set-path /blocked-ip if { src -f /etc/haproxy/blocked_ips.map } http-request set-path /blocked-ip if { src -f /etc/haproxy/blocked_ips.map }
use_backend default-backend if { src -f /etc/haproxy/blocked_ips.map } use_backend default-backend if { src -f /etc/haproxy/blocked_ips.map }
# Define threat levels based on scan attempts and rates # Define threat levels based on accumulated error responses from backends
acl has_scan_attempts sc0_get_gpc0 gt 0 # These will be checked on subsequent requests after errors are tracked
acl low_threat sc0_get_gpc0 ge 3 sc0_get_gpc0 lt 10 acl scanner_low sc0_get_gpc0 ge 5 # 5+ errors = potential scanner
acl medium_threat sc0_get_gpc0 ge 10 sc0_get_gpc0 lt 25 acl scanner_medium sc0_get_gpc0 ge 15 # 15+ errors = likely scanner
acl high_threat sc0_get_gpc0 ge 25 sc0_get_gpc0 lt 50 acl scanner_high sc0_get_gpc0 ge 30 # 30+ errors = confirmed scanner
acl critical_threat sc0_get_gpc0 ge 50 acl scanner_critical sc0_get_gpc0 ge 50 # 50+ errors = aggressive scanner
# Rate-based detection (burst attacks) # Rate-based detection (burst of errors)
acl burst_attack sc0_http_err_rate gt 5 # >5 errors in 10 seconds acl burst_scanner sc0_http_err_rate gt 5 # >5 errors in 10 seconds
# Combined threat detection # BLOCKING RULES - Block aggressive scanners completely
acl is_threat has_scan_attempts # Only block after significant error accumulation
acl needs_tarpit low_threat or medium_threat or high_threat or burst_attack http-request deny deny_status 429 if scanner_critical
# TARPIT RULES - Only apply to actual threats # TARPIT RULES - Slow down detected scanners
# Apply tarpit only if there are scan attempts # Apply progressive delays based on error count
http-request tarpit if needs_tarpit http-request tarpit if scanner_high
http-request tarpit if scanner_medium burst_scanner
# Complete block for critical threats # Note: The backend will increment sc0_get_gpc0 when it sees 400/401/403/404 responses
http-request deny deny_status 429 if critical_threat
# Increment scan counter when tarpit is applied (this happens after response in backend)