TrafficFilter 0.1.1

There is a newer version of this package available.
See the version list below for details.
dotnet add package TrafficFilter --version 0.1.1                
NuGet\Install-Package TrafficFilter -Version 0.1.1                
This command is intended to be used within the Package Manager Console in Visual Studio, as it uses the NuGet module's version of Install-Package.
<PackageReference Include="TrafficFilter" Version="0.1.1" />                
For projects that support PackageReference, copy this XML node into the project file to reference the package.
paket add TrafficFilter --version 0.1.1                
#r "nuget: TrafficFilter, 0.1.1"                
#r directive can be used in F# Interactive and Polyglot Notebooks. Copy this into the interactive tool or source code of the script to reference the package.
// Install TrafficFilter as a Cake Addin
#addin nuget:?package=TrafficFilter&version=0.1.1

// Install TrafficFilter as a Cake Tool
#tool nuget:?package=TrafficFilter&version=0.1.1                

TrafficFilter

ASP.NET Core middleware for request filtering and rate limiting. Configuration based URL Filter, Headers Filter and Rate Limiter.

About

TrafficFilter is an ASP.NET Core middleware that enables request filtering and rate-limiting. There are the following request filtering features available:

  • URL filtering
  • Headers filtering
  • Rate limiting

Each feature can be enabled and configured in the config file.

TrafficFilter may be useful in scenarios when you want to protect your web app and server resources from various scanning bots that try to access non-existent URLs by blacklisting their IP addresses for a configured amount of time.

Another use case could be protecting the app if it is accessed using a public server IP address.

It can also block traffic if configured path-based rate limit is reached.

Getting Started

First install the TrafficFilter NuGet package using PowerShell:

PM> Install-Package TrafficFilter

or via the dotnet command line:

dotnet add package TrafficFilter

Then add the TrafficFilter middleware to your ASP.NET Core Startup class:

using TrafficFilter;

namespace SampleWebApp
{
    public class Startup
    {
        // This method gets called by the runtime. Use this method to add services to the container.
        public void ConfigureServices(IServiceCollection services)
        {
            // --- TrafficFilter ---
            services.AddTrafficFilter(Configuration);

            //...
        }

        // This method gets called by the runtime. Use this method to configure the HTTP request pipeline.
        public void Configure(IApplicationBuilder app, IWebHostEnvironment env)
        {
            // --- TrafficFilter - topmost important! ---
            app.UseTrafficFilter();

            //...
        }
    }
}

Add TrafficFilter configuration section to appsettings.json, modify it as needed:

"TrafficFilter": {
    "IPBlacklistTimeoutSeconds": 5,
    "RequestFilterUrl": {
      "IsEnabled": true,
      "Matches": [
        {
          "Type": "MatchRegex",
          "Match": "https?:\\/\\/[\\d*\\.*]+" //Pattern for IP Address based Url
        },
        {
          "Type": "MatchEndsWith",
          "Match": ".xml"
        },       
        {
          "Type": "MatchContains",
          "Match": "mysql"
        },
        {
          "Type": "MatchStartsWith",
          "Match": "ftp"
        }
      ]
    },
    "RequestFilterHeaders": {
      "IsEnabled": true,
      "Matches": [
        {
          "Header": "user-agent",
          "Type": "MatchContains",
          "Match": "x-bot"
        }
      ]
    },
    "RateLimiter": {
      "IsEnabled": true,
      "RateLimiterWindowSeconds": 1,
      "RateLimiterRequestLimit": 10,
      "SkipUrls": [ // Add matches here if you want to exclude them from rate limiting
        {
          "Type": "MatchEndsWith",
          "Match": ".mp4"
        }
      ]
    }
  }

Documentation

If any of the enabled filters matches the incoming request, the requester's IP address is added to the blacklist for the duration of IPBlacklistTimeoutSeconds and HttpStatusCode.TooManyRequests is returned.

Possible values for Match Type are: MatchStartsWith, MatchContains, MatchEndsWith and MatchRegex.

License

Apache 2.0

Product Compatible and additional computed target framework versions.
.NET net5.0 was computed.  net5.0-windows was computed.  net6.0 was computed.  net6.0-android was computed.  net6.0-ios was computed.  net6.0-maccatalyst was computed.  net6.0-macos was computed.  net6.0-tvos was computed.  net6.0-windows was computed.  net7.0 was computed.  net7.0-android was computed.  net7.0-ios was computed.  net7.0-maccatalyst was computed.  net7.0-macos was computed.  net7.0-tvos was computed.  net7.0-windows was computed.  net8.0 was computed.  net8.0-android was computed.  net8.0-browser was computed.  net8.0-ios was computed.  net8.0-maccatalyst was computed.  net8.0-macos was computed.  net8.0-tvos was computed.  net8.0-windows was computed. 
.NET Core netcoreapp3.0 was computed.  netcoreapp3.1 was computed. 
.NET Standard netstandard2.1 is compatible. 
MonoAndroid monoandroid was computed. 
MonoMac monomac was computed. 
MonoTouch monotouch was computed. 
Tizen tizen60 was computed. 
Xamarin.iOS xamarinios was computed. 
Xamarin.Mac xamarinmac was computed. 
Xamarin.TVOS xamarintvos was computed. 
Xamarin.WatchOS xamarinwatchos was computed. 
Compatible target framework(s)
Included target framework(s) (in package)
Learn more about Target Frameworks and .NET Standard.

NuGet packages

This package is not used by any NuGet packages.

GitHub repositories

This package is not used by any popular GitHub repositories.

Version Downloads Last updated
1.0.5 401 4/2/2023
1.0.3 475 10/14/2021
1.0.2 313 10/13/2021
1.0.1 335 10/12/2021
1.0.0 318 10/4/2021
0.1.2 342 9/30/2021
0.1.1 310 9/29/2021
0.1.0-alpha 242 9/29/2021