bugzilla-daemon at netfilter.org
2013-Oct-13 09:49 UTC
[Bug 858] New: Some address cannot be blocked
https://bugzilla.netfilter.org/show_bug.cgi?id=858
Summary: Some address cannot be blocked
Product: iptables
Version: 1.4.x
Platform: All
OS/Version: All
Status: NEW
Severity: blocker
Priority: P1
Component: iptables
AssignedTo: netfilter-buglog at lists.netfilter.org
ReportedBy: antoine.gutzwiller at neutralite.org
Estimated Hours: 0.0
I've been attacked during a few hours, and if fail2ban told me the address
has
been banned, the attack was continuing, and I got around 50 fail2ban messages.
iptables - L return :
...
Chain fail2ban-ssh (1 references)
target prot opt source destination
DROP all -- 88-191-185-62.rev.dedibox.fr anywhere
RETURN all -- anywhere anywhere
...
So, I tried to add the address by myself :
iptables -A INPUT -s 88.191.185.62 -j DROP
But I got the same problem :
iptable -L show that the address has been transformed again from 88.191.185.62
to 88-191-185-62.rev.dedibox.fr (and the attack keep going, the rule doesn't
DROP anything)
Version : 1.4.8 (Debian old-stable)
--
Configure bugmail: https://bugzilla.netfilter.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.
bugzilla-daemon at netfilter.org
2013-Oct-13 09:58 UTC
[Bug 858] Some address cannot be blocked
https://bugzilla.netfilter.org/show_bug.cgi?id=858 --- Comment #1 from Antoine <antoine.gutzwiller at neutralite.org> 2013-10-13 11:58:24 CEST --- I should say : I am not an expert, so perhaps I just misunderstood something, and there is no bug at all. -- Configure bugmail: https://bugzilla.netfilter.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching all bug changes.
bugzilla-daemon at netfilter.org
2013-Oct-13 15:40 UTC
[Bug 858] Some address cannot be blocked
https://bugzilla.netfilter.org/show_bug.cgi?id=858
Phil Oester <netfilter at linuxace.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
CC| |netfilter at linuxace.com
Resolution| |INVALID
--- Comment #2 from Phil Oester <netfilter at linuxace.com> 2013-10-13
17:40:47 CEST ---
Once a session is in conntrack, adding DROP rules to INPUT chain will not
disallow traffic from it. You would need to flush the conntrack session table
first.
Please ask this question on the netfilter mailing list - there is no bug in
netfilter's ability to block IPs.
--
Configure bugmail: https://bugzilla.netfilter.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.