Displaying 20 results from an estimated 48 matches for "hitcount".
2012 Jun 11
1
iptables: hitcount
Hello,
up to CentOS 5.3 it was possible, to control new ip connections by
"recent", "seconds" and "hitcount"
-A INPUT -m state --state NEW -m recent --set -p tcp --dport 80
-A INPUT -m state --state NEW -m recent --update --seconds 60 --hitcount
1000 -p tcp --dport 80 -j LOG --log-prefix "FW DROP IP Flood: "
-A INPUT -p tcp -m tcp --dport 80 -m state --state NEW -m recent
--update --sec...
2009 Dec 22
2
IPTABLES --hitcount maximum value
Is the maximum permitted value for --hitcount documented anywhere?
I reliably get a iptables-restore error when I specify a hitcount
value greater than 20 but I cannot find any mention of there being a
maximum value.
--
*** E-Mail is NOT a SECURE channel ***
James B. Byrne mailto:ByrneJB at Harte-Lyne.ca
Ha...
2011 Jan 27
2
centos 5.5: iptables: module recent
Hello,
I have well performing iptables in centos 5.2 and 5.3 :
-A INPUT -m state --state NEW -m recent --update --seconds 60 --hitcount 1000 -p tcp --dport 25 -j LOG --log-prefix "FW DROP IP Flood: "
Centos 5.5, updated today:
Without -hitcount : iptables accept the line
Including -hitcount : iptables brings an error message:
Applying iptables firewall rules: iptables-restore: line 47 failed...
2006 Apr 11
0
[Bug 469] New: recent match doesn't triger with --hitcount > 20
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=469
Summary: recent match doesn't triger with --hitcount > 20
Product: netfilter/iptables
Version: linux-2.6.x
Platform: i386
OS/Version: other
Status: NEW
Severity: normal
Priority: P2
Component: ip_tables (kernel)
AssignedTo: laforge@netfilter.org
Report...
2008 Aug 19
4
Simple IPTABLES Question
I added these rules to IPTABLES to slow brute force attacks.
iptables -A INPUT -p tcp --dport 22 -s my_subnet/24 -j ACCEPT
iptables -A INPUT -p tcp --dport 22 -m state --state NEW -m recent
--set --name SSH
iptables -A INPUT -p tcp --dport 22 -m state --state NEW -m recent
--update --seconds 60 --hitcount 5 --rttl --name SSH -j DROP
I would like log entries when connections are dropped to see that its
working. How do I do that?
I am guessing I would add this before the drop.
iptables -A INPUT -p tcp --dport 22 -m state --state NEW -m recent
--update --seconds 60 --hitcount 5 --rttl --name SSH -j...
2006 Apr 12
1
[Bug 469] recent match doesn't triger with --hitcount > 20
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=469
netfilter@linuxace.com changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |netfilter@linuxace.com
Status|NEW |RESOLVED
Resolution|
2009 Aug 16
1
to filter dos ip using iptables recent
...ks
and I would like to filter the excessive spam mail sending ip address by iptables recent module.
and some questions.
iptables -A INPUT -p tcp --dport 25 -m state --state NEW -m recent --set --name SPAM
iptables -A INPUT -p tcp --dport 25 -m state --state NEW -m recent --update --seconds 60 --hitcount 4 --rttl --name SPAM -j DROP
If I set like above,
I can't understand the meaning of the hitcount.
it means the number of a packet, session or connection?
above rule means if 4 connection for 60 seconds, the ip will be filtered for 60 seconds, right?
if some ip was filtered, how long...
2013 Mar 07
1
Fwd: mistake on Securing SSH
...com>
Cc:
Hi TImothy,
I saw wiki http://wiki.centos.org/HowTos/Network/SecuringSSH and it is
pretty good, but there is a mistake.
*Instead of having*
iptables -A INPUT -p tcp --dport 22 -m recent --set --name ssh --rsource
iptables -A INPUT -p tcp --dport 22 -m recent ! --rcheck --seconds 60
--hitcount 4 --name ssh --rsource -j ACCEPT
*You should have*
iptables -A INPUT -p tcp --dport 22 *-m state --state NEW* -m recent --set
--name ssh --rsource
iptables -A INPUT -p tcp --dport 22 *-m state --state NEW* -m recent !
--rcheck --seconds 60 --hitcount 4 --name ssh --rsource -j ACCEPT
Brgds.
--
Mar...
2010 Oct 28
5
being bombarded with SIP packets
Over the last two weeks, we have had at least two "incidents" where our
asterisk server got flooded (a hundred or more per second) by SIP
packets. Once from 114.31.50.10, second time from 173.212.200.146. We
became aware of the problem when bandwidth started suffering because
asterisk got very busy sending back replies or rejects (dunno which, I
didn't investigate it any further).
2011 Apr 05
2
Iptables configuration to handle brute, force registrations?
fail2ban might be good for this.
On 04/05/2011 01:00 PM, asterisk-users-request at lists.digium.com wrote:
>
> Date: Tue, 5 Apr 2011 08:44:41 -0700 (PDT)
> From: Steve Edwards<asterisk.org at sedwards.com>
> Subject: Re: [asterisk-users] Iptables configuration to handle brute
> force registrations?
>
> On Tue, 5 Apr 2011, Gilles wrote:
>
>> I'm no expert
2011 Apr 04
6
sshd: Authentication Failures: 137 Time(s)
Hi,
to prevent scripted dictionary attacks to sshd
I applied those iptables rules:
-A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -m recent
--update --seconds 60 --hitcount 4 --name SSH --rsource -j DROP
-A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -m recent --set
--name SSH --rsource
And this is part of logwatch:
sshd:
Authentication Failures:
unknown (www.telkom.co.ke): 137 Time(s)
unknown (mkongwe.jambo.co.ke): 130 Time(s)...
2018 Jun 05
2
Help attack DDOS
I ask because I only receive attacks when I activate icecast. I can not do
anything at the application level ?. i used ubuntu server 16.04. thanks.
2018-06-05 14:52 GMT-05:00 Alejandro Flores <alex at mordormx.net>:
> I think you should contact to your connectivity provider, hopefully they
> can provide you the Anti DDOS protection.
>
>
> On Tue, Jun 5, 2018 at 2:16 PM,
2015 Dec 28
9
Firewall trouble?
...DROP
- -P FORWARD DROP
- -P OUTPUT ACCEPT
- -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 22 -m state --state NEW -m recent --set
- --name BLOCKED --rsource
- -A INPUT -p tcp -m tcp --dport 22 -m state --state NEW -m recent
- --update --seconds 600 --hitcount 4 --name BLOCKED --rsource -j DROP
- -A INPUT -p icmp -m icmp --icmp-type 3 -j ACCEPT
- -A INPUT -p icmp -m icmp --icmp-type 11 -j ACCEPT
- -A INPUT -p icmp -m icmp --icmp-type 12 -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 113 --tcp-flags FIN,SYN,RST,ACK SYN -j
REJECT --reject-with tcp-reset
- -A I...
2005 Oct 25
5
Problem SSH
My Centos 4.1 only accept connections from localhost, my file conf is
default.
error: ssh: connect to host 192.168.1.78 port 22: No route to host
thanks
2015 Dec 29
1
Firewall trouble?
...s -S
-P INPUT DROP
-P FORWARD DROP
-P OUTPUT ACCEPT
-A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A INPUT -p tcp -m tcp --dport 22 -m state --state NEW -m recent --set
--name BLOCKED --rsource
-A INPUT -p tcp -m tcp --dport 22 -m state --state NEW -m recent
--update --seconds 600 --hitcount 4 --name BLOCKED --rsource -j DROP
-A INPUT -p icmp -m icmp --icmp-type 3 -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 11 -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 12 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 113 --tcp-flags FIN,SYN,RST,ACK SYN -j
REJECT --reject-with tcp-reset
-A INPUT -s 10...
2018 Jun 05
0
Help attack DDOS
...4f48b41a22bfe472e82d97a>
------------------------------
These firewall rules (iptables) could help:
*Code:*
iptables -A INPUT -p tcp --dport 8000 -m state --state NEW -m recent -i
eth0 --set --name ICECAST -j ACCEPT
iptables -A INPUT -p tcp --dport 8000 -m recent -i eth0 --update --seconds
60 --hitcount 4 --rttl --name ICECAST -j LOG --log-prefix
"ICECAST_too_many_connections"
iptables -A INPUT -p tcp --dport 8000 -m recent -i eth0 --update --seconds
60 --hitcount 4 --rttl --name ICECAST -j DROP
This allows three connections within a minute by the same IP, the forth
will cause the IP to...
2003 Jun 01
1
[Bug 58] save() function of libipt_recent.c broken
...bug
------- Additional Comments From email@cs-ware.de 2003-06-01 02:06 -------
The fix (version 1.7) doesn't resolve the bug completely. The "iptables-save"
command doesn't create useful results:
#iptables -A INPUT -p tcp -m tcp --dport 80 -m recent --rcheck --seconds 7200 --
hitcount 4 --name httpdauth -j DROP
#iptables --list
Chain INPUT (policy ACCEPT)
target prot opt source destination
DROP tcp -- anywhere anywhere tcp dpt:http
recent: CHECK seconds: 7200 hit_count: 4 name: httpdauth side: source
#iptables-save
-A INPUT -p t...
2007 Oct 10
0
How to use rate limit with marks set on packets with own queue???
...XPECT the marked
ones:
iptables -N test
### WHAT DO I HAVE TO PUT THAT ALL MARKED or say MARK 0x1 go on not to
test ...
iptables -A FORWARD -p TCP -j test
iptables -A test -p tcp -m state --state NEW -m recent --set
iptables -A test -p tcp -m state --state NEW -m recent --update
--seconds 60 --hitcount 2 -j LOG
iptables -A test -p tcp -m state --state NEW -m recent --update
--seconds 60 --hitcount 2 -j DROP
Or is there a much better way to do this???
Thanks a lot for any hints!!!
Beat
2005 Sep 12
2
ip rule to block ssh attack
...ll?
I see how to setup the timing/rates but how to perform loggin of such action (a separate rule?).
as an additional question is i possible to dynamically add hosts to blacklist and persist this between restarts?
"
SSH -A PREROUTING -m tcp -p tcp -d $EXTERNAL --dport 22 -m recent --rcheck --hitcount 3 --seconds 600 -j LOG --log-prefix "SSH attack: " -A PREROUTING -m tcp -p tcp -d $EXTERNAL --dport 22 -m recent --rcheck --hitcount 3 --seconds 600 -j DROP -A PREROUTING -m tcp -p tcp -d $EXTERNAL --dport 22 -m recent --set -j DNAT --to-destination $INTERNAL:22 -A OUTPUT -m tcp -p tcp -d...
2007 Sep 27
2
Problem getting "extract" from RDig
...)
11.
12. end
I have created the index file using the code
1. rdig -c config/rdig_config.rb
Now in my controller I have written a code for testing the functionality
1. search_results = RDig.searcher.search("some_string")
2. @results = search_results[:list]
3. @hitcount = search_results[:hitcount]
My @result[:extract]is returning me the same initial view code that is
common to the application that is my menus and sub menus.. I am not
getting the extract on the basis of which I had searched.
Any help in this regard would be highly appreciated..
Thanks in advance:...