TrafficFilter 1.0.2
See the version list below for details.
dotnet add package TrafficFilter --version 1.0.2
NuGet\Install-Package TrafficFilter -Version 1.0.2
<PackageReference Include="TrafficFilter" Version="1.0.2" />
paket add TrafficFilter --version 1.0.2
#r "nuget: TrafficFilter, 1.0.2"
// Install TrafficFilter as a Cake Addin #addin nuget:?package=TrafficFilter&version=1.0.2 // Install TrafficFilter as a Cake Tool #tool nuget:?package=TrafficFilter&version=1.0.2
TrafficFilter
ASP.NET Core middleware for request filtering and rate limiting. Configuration based URL Filter, Headers Filter and Rate Limiter.
About
TrafficFilter is an ASP.NET Core middleware that enables request filtering and rate-limiting. Once any filtering rule matches, the requester's IP address is blacklisted for the duration of a configured period. The following request filters are available:
- URL
- Headers
- Rate Limiting
Each filter can be enabled and configured in the app config file.
TrafficFilter may be useful in scenarios when you want to protect your origin server resources from scanners/bots that try to access non-existent URLs.
Another use case could be protecting the app from accessing it using a public IP address.
TrafficFilter can also block requests from further processing if the configured rate limit is reached.
Getting Started
First install the TrafficFilter NuGet package using PowerShell:
PM> Install-Package TrafficFilter
or via the dotnet command line:
dotnet add package TrafficFilter
Then add the TrafficFilter middleware to your ASP.NET Core Startup
class:
using TrafficFilter;
namespace SampleWebApp
{
public class Startup
{
// This method gets called by the runtime. Use this method to add services to the container.
public void ConfigureServices(IServiceCollection services)
{
// --- TrafficFilter ---
services.AddTrafficFilter(Configuration);
//...
}
// This method gets called by the runtime. Use this method to configure the HTTP request pipeline.
public void Configure(IApplicationBuilder app, IWebHostEnvironment env, ILogger<Startup> logger)
{
if (env.IsProduction())
{
var forwardedOptions = new ForwardedHeadersOptions()
{
ForwardedHeaders = ForwardedHeaders.All,
ForwardLimit = null
};
forwardedOptions.FillKnownNetworks(logger); // TrafficFilter extension to load Cloudflare IP ranges and fill KnownNetworks (https://www.cloudflare.com/ips/)
app.UseForwardedHeaders(forwardedOptions);
}
// --- TrafficFilter ---
app.UseTrafficFilter();
//...
}
}
}
Add TrafficFilter configuration section to appsettings.json
, modify it as needed:
"TrafficFilter": {
"IPBlacklistTimeoutSeconds": 5,
"RequestFilterUrl": {
"IsEnabled": true,
"Matches": [
{
"Type": "Regex",
"Match": "https?:\\/\\/[\\d*\\.*]+" //Pattern for IP Address based Url
},
{
"Type": "EndsWith",
"Match": ".xml"
},
{
"Type": "Contains",
"Match": "mysql"
},
{
"Type": "StartsWith",
"Match": "ftp"
}
]
},
"RequestFilterHeaders": {
"IsEnabled": true,
"Matches": [
{
"Header": "user-agent",
"Type": "Contains",
"Match": "x-bot"
}
]
},
"RateLimiter": {
"IsEnabled": true,
"RateLimiterWindowSeconds": 2,
"RateLimiterRequestLimit": 3,
"WhitelistUrls": [
{
"Type": "EndsWith",
"Match": ".mp4"
}
]
}
}
Documentation
If any of the enabled filters matches the incoming request, the requester's IP address is added to the blacklist for the duration of IPBlacklistTimeoutSeconds
and HttpStatusCode.TooManyRequests
is returned.
Rate limiting is applied per IP address / Request Path.
Possible values for Match Type are: StartsWith
, Contains
, EndsWith
and Regex
.
To support Cloudflare setup, use forwardedOptions.FillKnownNetworks()
extension method to load and populate known networks.
Take a look at SampleWebApp
for configuration details if needed.
Credits
Icons made by Freepik from www.flaticon.com
License
Product | Versions Compatible and additional computed target framework versions. |
---|---|
.NET | net5.0 was computed. net5.0-windows was computed. net6.0 was computed. net6.0-android was computed. net6.0-ios was computed. net6.0-maccatalyst was computed. net6.0-macos was computed. net6.0-tvos was computed. net6.0-windows was computed. net7.0 was computed. net7.0-android was computed. net7.0-ios was computed. net7.0-maccatalyst was computed. net7.0-macos was computed. net7.0-tvos was computed. net7.0-windows was computed. net8.0 was computed. net8.0-android was computed. net8.0-browser was computed. net8.0-ios was computed. net8.0-maccatalyst was computed. net8.0-macos was computed. net8.0-tvos was computed. net8.0-windows was computed. |
.NET Core | netcoreapp3.0 was computed. netcoreapp3.1 was computed. |
.NET Standard | netstandard2.1 is compatible. |
MonoAndroid | monoandroid was computed. |
MonoMac | monomac was computed. |
MonoTouch | monotouch was computed. |
Tizen | tizen60 was computed. |
Xamarin.iOS | xamarinios was computed. |
Xamarin.Mac | xamarinmac was computed. |
Xamarin.TVOS | xamarintvos was computed. |
Xamarin.WatchOS | xamarinwatchos was computed. |
-
.NETStandard 2.1
- Microsoft.AspNetCore.Http.Abstractions (>= 2.2.0)
- Microsoft.AspNetCore.Http.Extensions (>= 2.2.0)
- Microsoft.AspNetCore.HttpOverrides (>= 2.2.0)
- Microsoft.Extensions.Configuration (>= 5.0.0)
- Microsoft.Extensions.Logging.Abstractions (>= 5.0.0)
- Microsoft.Extensions.Options (>= 5.0.0)
- Microsoft.Extensions.Options.ConfigurationExtensions (>= 5.0.0)
NuGet packages
This package is not used by any NuGet packages.
GitHub repositories
This package is not used by any popular GitHub repositories.