search for: hitcount

Displaying 20 results from an estimated 45 matches for "hitcount".

2012 Jun 11
1
iptables: hitcount
Hello, up to CentOS 5.3 it was possible, to control new ip connections by "recent", "seconds" and "hitcount" -A INPUT -m state --state NEW -m recent --set -p tcp --dport 80 -A INPUT -m state --state NEW -m recent --update --seconds 60 --hitcount 1000 -p tcp --dport 80 -j LOG --log-prefix "FW DROP IP Flood: " -A INPUT -p tcp -m tcp --dport 80 -m state --state NEW -m recent --update --sec...
2009 Dec 22
2
IPTABLES --hitcount maximum value
Is the maximum permitted value for --hitcount documented anywhere? I reliably get a iptables-restore error when I specify a hitcount value greater than 20 but I cannot find any mention of there being a maximum value. -- *** E-Mail is NOT a SECURE channel *** James B. Byrne mailto:ByrneJB at Harte-Lyne.ca Ha...
2011 Jan 27
2
centos 5.5: iptables: module recent
Hello, I have well performing iptables in centos 5.2 and 5.3 : -A INPUT -m state --state NEW -m recent --update --seconds 60 --hitcount 1000 -p tcp --dport 25 -j LOG --log-prefix "FW DROP IP Flood: " Centos 5.5, updated today: Without -hitcount : iptables accept the line Including -hitcount : iptables brings an error message: Applying iptables firewall rules: iptables-restore: line 47 failed...
2006 Apr 11
0
[Bug 469] New: recent match doesn't triger with --hitcount > 20
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=469 Summary: recent match doesn't triger with --hitcount > 20 Product: netfilter/iptables Version: linux-2.6.x Platform: i386 OS/Version: other Status: NEW Severity: normal Priority: P2 Component: ip_tables (kernel) AssignedTo: laforge@netfilter.org Report...
2008 Aug 19
4
Simple IPTABLES Question
I added these rules to IPTABLES to slow brute force attacks. iptables -A INPUT -p tcp --dport 22 -s my_subnet/24 -j ACCEPT iptables -A INPUT -p tcp --dport 22 -m state --state NEW -m recent --set --name SSH iptables -A INPUT -p tcp --dport 22 -m state --state NEW -m recent --update --seconds 60 --hitcount 5 --rttl --name SSH -j DROP I would like log entries when connections are dropped to see that its working. How do I do that? I am guessing I would add this before the drop. iptables -A INPUT -p tcp --dport 22 -m state --state NEW -m recent --update --seconds 60 --hitcount 5 --rttl --name SSH -j...
2006 Apr 12
1
[Bug 469] recent match doesn't triger with --hitcount > 20
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=469 netfilter@linuxace.com changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |netfilter@linuxace.com Status|NEW |RESOLVED Resolution|
2009 Aug 16
1
to filter dos ip using iptables recent
...ks and I would like to filter the excessive spam mail sending ip address by iptables recent module. and some questions. iptables -A INPUT -p tcp --dport 25 -m state --state NEW -m recent --set --name SPAM iptables -A INPUT -p tcp --dport 25 -m state --state NEW -m recent --update --seconds 60 --hitcount 4 --rttl --name SPAM -j DROP If I set like above, I can't understand the meaning of the hitcount. it means the number of a packet, session or connection? above rule means if 4 connection for 60 seconds, the ip will be filtered for 60 seconds, right? if some ip was filtered, how long...
2013 Mar 07
1
Fwd: mistake on Securing SSH
...com> Cc: Hi TImothy, I saw wiki http://wiki.centos.org/HowTos/Network/SecuringSSH and it is pretty good, but there is a mistake. *Instead of having* iptables -A INPUT -p tcp --dport 22 -m recent --set --name ssh --rsource iptables -A INPUT -p tcp --dport 22 -m recent ! --rcheck --seconds 60 --hitcount 4 --name ssh --rsource -j ACCEPT *You should have* iptables -A INPUT -p tcp --dport 22 *-m state --state NEW* -m recent --set --name ssh --rsource iptables -A INPUT -p tcp --dport 22 *-m state --state NEW* -m recent ! --rcheck --seconds 60 --hitcount 4 --name ssh --rsource -j ACCEPT Brgds. -- Mar...
2010 Oct 28
5
being bombarded with SIP packets
Over the last two weeks, we have had at least two "incidents" where our asterisk server got flooded (a hundred or more per second) by SIP packets. Once from 114.31.50.10, second time from 173.212.200.146. We became aware of the problem when bandwidth started suffering because asterisk got very busy sending back replies or rejects (dunno which, I didn't investigate it any further).
2011 Apr 05
2
Iptables configuration to handle brute, force registrations?
fail2ban might be good for this. On 04/05/2011 01:00 PM, asterisk-users-request at lists.digium.com wrote: > > Date: Tue, 5 Apr 2011 08:44:41 -0700 (PDT) > From: Steve Edwards<asterisk.org at sedwards.com> > Subject: Re: [asterisk-users] Iptables configuration to handle brute > force registrations? > > On Tue, 5 Apr 2011, Gilles wrote: > >> I'm no expert
2011 Apr 04
6
sshd: Authentication Failures: 137 Time(s)
Hi, to prevent scripted dictionary attacks to sshd I applied those iptables rules: -A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -m recent --update --seconds 60 --hitcount 4 --name SSH --rsource -j DROP -A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -m recent --set --name SSH --rsource And this is part of logwatch: sshd: Authentication Failures: unknown (www.telkom.co.ke): 137 Time(s) unknown (mkongwe.jambo.co.ke): 130 Time(s)...
2018 Jun 05
2
Help attack DDOS
I ask because I only receive attacks when I activate icecast. I can not do anything at the application level ?. i used ubuntu server 16.04. thanks. 2018-06-05 14:52 GMT-05:00 Alejandro Flores <alex at mordormx.net>: > I think you should contact to your connectivity provider, hopefully they > can provide you the Anti DDOS protection. > > > On Tue, Jun 5, 2018 at 2:16 PM,
2015 Dec 28
9
Firewall trouble?
...DROP - -P FORWARD DROP - -P OUTPUT ACCEPT - -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT - -A INPUT -p tcp -m tcp --dport 22 -m state --state NEW -m recent --set - --name BLOCKED --rsource - -A INPUT -p tcp -m tcp --dport 22 -m state --state NEW -m recent - --update --seconds 600 --hitcount 4 --name BLOCKED --rsource -j DROP - -A INPUT -p icmp -m icmp --icmp-type 3 -j ACCEPT - -A INPUT -p icmp -m icmp --icmp-type 11 -j ACCEPT - -A INPUT -p icmp -m icmp --icmp-type 12 -j ACCEPT - -A INPUT -p tcp -m tcp --dport 113 --tcp-flags FIN,SYN,RST,ACK SYN -j REJECT --reject-with tcp-reset - -A I...
2005 Oct 25
5
Problem SSH
My Centos 4.1 only accept connections from localhost, my file conf is default. error: ssh: connect to host 192.168.1.78 port 22: No route to host thanks
2015 Dec 29
1
Firewall trouble?
...s -S -P INPUT DROP -P FORWARD DROP -P OUTPUT ACCEPT -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT -A INPUT -p tcp -m tcp --dport 22 -m state --state NEW -m recent --set --name BLOCKED --rsource -A INPUT -p tcp -m tcp --dport 22 -m state --state NEW -m recent --update --seconds 600 --hitcount 4 --name BLOCKED --rsource -j DROP -A INPUT -p icmp -m icmp --icmp-type 3 -j ACCEPT -A INPUT -p icmp -m icmp --icmp-type 11 -j ACCEPT -A INPUT -p icmp -m icmp --icmp-type 12 -j ACCEPT -A INPUT -p tcp -m tcp --dport 113 --tcp-flags FIN,SYN,RST,ACK SYN -j REJECT --reject-with tcp-reset -A INPUT -s 10...
2018 Jun 05
0
Help attack DDOS
...4f48b41a22bfe472e82d97a> ------------------------------ These firewall rules (iptables) could help: *Code:* iptables -A INPUT -p tcp --dport 8000 -m state --state NEW -m recent -i eth0 --set --name ICECAST -j ACCEPT iptables -A INPUT -p tcp --dport 8000 -m recent -i eth0 --update --seconds 60 --hitcount 4 --rttl --name ICECAST -j LOG --log-prefix "ICECAST_too_many_connections" iptables -A INPUT -p tcp --dport 8000 -m recent -i eth0 --update --seconds 60 --hitcount 4 --rttl --name ICECAST -j DROP This allows three connections within a minute by the same IP, the forth will cause the IP to...
2003 Jun 01
1
[Bug 58] save() function of libipt_recent.c broken
...bug ------- Additional Comments From email@cs-ware.de 2003-06-01 02:06 ------- The fix (version 1.7) doesn't resolve the bug completely. The "iptables-save" command doesn't create useful results: #iptables -A INPUT -p tcp -m tcp --dport 80 -m recent --rcheck --seconds 7200 -- hitcount 4 --name httpdauth -j DROP #iptables --list Chain INPUT (policy ACCEPT) target prot opt source destination DROP tcp -- anywhere anywhere tcp dpt:http recent: CHECK seconds: 7200 hit_count: 4 name: httpdauth side: source #iptables-save -A INPUT -p t...
2007 Oct 10
0
How to use rate limit with marks set on packets with own queue???
...XPECT the marked ones: iptables -N test ### WHAT DO I HAVE TO PUT THAT ALL MARKED or say MARK 0x1 go on not to test ... iptables -A FORWARD -p TCP -j test iptables -A test -p tcp -m state --state NEW -m recent --set iptables -A test -p tcp -m state --state NEW -m recent --update --seconds 60 --hitcount 2 -j LOG iptables -A test -p tcp -m state --state NEW -m recent --update --seconds 60 --hitcount 2 -j DROP Or is there a much better way to do this??? Thanks a lot for any hints!!! Beat
2005 Sep 12
2
ip rule to block ssh attack
...ll? I see how to setup the timing/rates but how to perform loggin of such action (a separate rule?). as an additional question is i possible to dynamically add hosts to blacklist and persist this between restarts? " SSH -A PREROUTING -m tcp -p tcp -d $EXTERNAL --dport 22 -m recent --rcheck --hitcount 3 --seconds 600 -j LOG --log-prefix "SSH attack: " -A PREROUTING -m tcp -p tcp -d $EXTERNAL --dport 22 -m recent --rcheck --hitcount 3 --seconds 600 -j DROP -A PREROUTING -m tcp -p tcp -d $EXTERNAL --dport 22 -m recent --set -j DNAT --to-destination $INTERNAL:22 -A OUTPUT -m tcp -p tcp -d...
2007 Sep 27
2
Problem getting "extract" from RDig
...) 11. 12. end I have created the index file using the code 1. rdig -c config/rdig_config.rb Now in my controller I have written a code for testing the functionality 1. search_results = RDig.searcher.search("some_string") 2. @results = search_results[:list] 3. @hitcount = search_results[:hitcount] My @result[:extract]is returning me the same initial view code that is common to the application that is my menus and sub menus.. I am not getting the extract on the basis of which I had searched. Any help in this regard would be highly appreciated.. Thanks in advance:...