Displaying 20 results from an estimated 50000 matches similar to: "Shorewall rate limiting rules?"
2005 Feb 23
9
shorewall friendly way of limiting ssh brute force attacks?
I was wondering if anyone had implemented rules like this in shorewall:
http://blog.andrew.net.au/tech
I see tons of brute force attempts on the machines I administer, and I like
the idea of limiting them without the need for extra daemons scanning for
attacks.
Thanks,
Dale
--
Dale E. Martin - dale@the-martins.org
http://the-martins.org/~dmartin
2004 Sep 06
10
bug in shorewall shorewall-2.1.7-1 rpm??
Hi!
I installed shorewall shorewall-2.1.7-1 on a newly installed box.
When using 1.4 versions I could enable shorewall in ntsysv, now shorewall
doesn''t show up in ntsysv?
I am running shorewall on a RedHat Enterprise Linux rebuild
(www.taolinux.org).
Is this a bug or a feature?
2008 Jul 23
3
login processes from attacks staying for hours
I'm in the process of rolling out new setups with dovecot on CentOS 5.2
and I notice that dovecot doesn't handle the brute-force attacks too nice.
I reduced the limit a bit to some reasonable looking value:
login_max_processes_count = 32
to stop them earlier and the number of processes stops at that figure when
an attack happens.
However, it stays at this count for hours although the
2013 Sep 01
2
ICMP rate limit terminates shorewall
I''m using the following rule on 3 different systems running
shorewall-4.5.18 on Gentoo:
ACCEPT all all icmp - - - 10/sec:20
shorewall starts fine on 2 of the systems but on the 3rd it fails to
start with the following error:
iptables-restore: line 119 failed
ERROR: iptables-restore Failed. Input is in
/var/lib/shorewall/.iptables-restore-input
/usr/share/shorewall/lib.common: line 113:
2005 Feb 24
2
Rate limiting
I am trying to rate limit a particular user/ip''s news traffic and have
added the line
ACCEPT loc:10.5.75.253 net tcp 119 -
- 1/sec:2
While this has slowed down the traffic, it has not throttled it to the
point I would like.
Yet with a sniffer I can see around 15 packets a second going thru. My
T1 is close to saturation, and I would like to
2002 Aug 07
2
Re: [Shorewall-users] Common Rules
John,
I''m taking the liberty of copying the Shorwall Development list since I
believe that these issues will be of interest.
On Tue, 6 Aug 2002, Links at Momsview wrote:
> Tom,
> I''m not sure if you ever saw this document but it describes some of the
> reasons you are seeing strange packets
> after setting up NEW not SYN
>
2005 Apr 24
6
redirect: net to fw
I have router/server that I would like to ssh to from the net. In
order to discourage brute force attacks I would like to redirect all
connections on a non-standard port to port 22 on the router/server.
If notice that setting up a rule
REDIRECT net 22 tcp 4104
causes the firewall to open both ports 4104 and 22 to connections from
the net. Is it possible to only redirect 4104 to the
2024 Apr 25
1
how to block brute force attacks on reverse tunnels?
On 25.04.24 17:15, openssh-unix-dev-request at mindrot.org digested:
> Subject: how to block brute force attacks on reverse tunnels?
> From: Steve Newcomb <srn at coolheads.com>
> Date: 25.04.24, 17:14
>
> For many years I've been running ssh reverse tunnels on portable Linux,
> OpenWRT, Android etc. hosts so they can be accessed from a server whose
> IP is stable
2012 Jan 31
6
Shorewall and sshdfilter
Hi All!
Been quite a few years and lots of water under the bridge but here I am back!
I have a customer that has now decided they need a bit more bandwidth over and
above their fixed line! They are not in a good area for ADSL because of copper
theft and being a bit to far from the closest DSLAM! They have installed a
wireless link and I have made certain that put it behind my simple iptables
2012 Jun 05
2
Anti DDOS rules
Hi,
How can I tell shorewall to block any ip address if it generate x no of
request within x no of seconds. I want to filter SYN, ICMP and HTTP Get
floods etc. Is it possible have a minimum local level deterrence against
ddos attacks at firewall level?
--
AzfarHashmi
Cloudways
Your Managed Cloud
e: azfar.hashmi@cloudways.com
w: www.cloudways.com <http://www.cloudways.com>
PGP
2003 Jul 16
6
HOWTO: Temporary dynamic blocking with Shorewall and Portsentry
Hi, all:
This is just a note and suggestion, not a question; but I really like this
system and thought it might be useful to others so I decided to share. Hope
it helps someone, and comments or suggestions are always welcome.
1. Overview: Shorewall accepts traffic on ports that I consider
"hostile" (i.e. ports on which I would NEVER expect to see connections) and
redirects
2002 Nov 20
3
Spam vs. Viruses
I have purchased a license for Vexira MailArmor (an antivirus product) and
the good news is that it is installed and working at shorewall.net. The bad
news is that I have yet to get Vexira running together with SpamAssassin :-(
As things currently stand, list posts will be protected from viruses but
may contain Spam. I''ll continue to work to correct this situation.
-Tom
--
Tom Eastep
2005 Jun 23
1
Rate Limit Unauthenticated connections ?
I am seeing a recent increase in SSH harvesting attempts and brute
forcing in the log of my system.
I'm interested in opening up some discussion around what OpenSSH can do
itself to counter measure against:
* DoS attack where too many unauthenticated connections are open. I'm
not interested in stopping the professional saboteur but the casual
script kiddie (to use IRC terms) from
2009 Mar 27
1
Six steps to better SIP security with Asterisk
In case any of you were wondering why there has been a fairly notable
upswing in the attacks happening on SIP endpoints, the answer is
"script kiddies." In the last few months, a number of new tools have
made it easy for knuckle-draggers to attack and defraud SIP endpoints,
Asterisk-based systems included. There are easily-available tools
that scan networks looking for SIP
2013 Jun 20
2
Trap and Log With Shorewall
There are massive attacks on specific port, I want to trap and log just the ip source to this port. Is there anyway to do so with shorewall? Thanks.
Willy Mularto
sangprabv@gmail.com
------------------------------------------------------------------------------
This SF.net email is sponsored by Windows:
Build for Windows Store.
http://p.sf.net/sfu/windows-dev2dev
2009 Mar 13
0
Polices, Rules and Configurations - No Success (#/etc/shorewall/policy)
Hello,
I forgot to put my #/etc/shorewall/policy file:
# /etc/shorewall/policy
###############################################################################
#SOURCE DEST POLICY LOG LIMIT: CONNLIMIT:
# LEVEL BURST MASK
#
adm net DROP info
tlm net DROP info
#
net adm DROP
2004 May 10
5
rate limiting sshd connections ?
Does anyone know of a way to rate limit ssh connections from an IP address
? We are starting to see more and more brute force attempts to guess
simple passwords "/usr/sbin/inetd -wWl -C 10" is nice for slowing down
attempts to services launched via inetd. Is there an equiv method for
doing this to sshd? Running from inetd has some issues supposedly.
---Mike
2008 Jan 30
5
One approach to dealing with SSH brute force attacks.
Message-ID: <479F2A63.2070408 at centos.org>
On: Tue, 29 Jan 2008 07:30:11 -0600, Johnny Hughes <johnny at centos.org>
Subject Was: [CentOS] Unknown rootkit causes compromised servers
>
> SOME of the script kiddies check higher ports for SSH *_BUT_* I only see
> 4% of the brute force attempts to login on ports other than 22.
>
> I would say that dropping brute force
2004 Feb 13
6
Error: Rate Limiting only available with ACCEPT, DNAT[-], REDIRECT[-] and LOG
I think it would be nice to be able to rate limit an action, too..
suppose I have an action named Accept_good_source :
ACCEPT - - tcp - 1024:65535
ACCEPT - - udp - 1024:65535
and that i want to use it in an action called AllowCVS,
i can''t limit the cvs usage, but only the general use of
Accept_good_source...
same goes for userset...
as each rule will give one iptables command,
I
2008 May 29
1
shorewall & ipsec rules with "FORWARD:DROP" packets
I have been working really hard configuring and researching very
extensively, trying to figure why we are getting
"Shorewall:FORWARD:DROP" packets. IPSEC works just fine without the
iptable rules created by our shorewall configs but when starting
shorewall and creating the iptables I noticed the packets are dropped.
I know it is a config situation but I am totally racking my brain as