Table of Contents

eBPF Configuration

This page outlines how to configure and enable eBPF integration for TapeTrack Server on Linux systems. eBPF (Extended Berkeley Packet Filter) allows TapeTrack to dynamically manage IP-level blocking at the kernel level during the time-out period.

Prerequisites

Before enabling eBPF support, ensure the following:

Setup

Create or Load an eBPF Table

Use your preferred method to create an eBPF table that supports IP filtering. This may involve:

Example:

bpftool map create /sys/fs/bpf/tapetrack_block_map type hash key 4 value 4 entries 1024 name tapetrack_block_map

Start TapeTrack Server with eBPF Integration

Launch the TapeTrack Server with the -B argument pointing to the eBPF table:

./TapeTrackServer -B /sys/fs/bpf/tapetrack_block_map

This enables dynamic IP blocking. When a client sends a non-TapeTrack packet, its IP will be added to the eBPF table and blocked at the kernel level for the duration of the time-out period.

Monitor and Verify

To confirm that IPs are being added and removed correctly:

bpftool map dump name tapetrack_block_map

You should see entries corresponding to banned IP addresses.

Notes

eBPF integration is optional but recommended for public-facing servers

Ensure firewall rules do not conflict with eBPF behavior

TapeTrack will manage the table dynamically — manual edits may be overwritten

See Also

TapeTrack Server: Anti-Throttle and Anti-Hacking Measures