Displaying 20 results from an estimated 7000 matches similar to: "[Bug 772] New: Rate Limiting"
2013 Mar 07
1
Fwd: mistake on Securing SSH
This was sent to me regarding the wiki.
---------- Forwarded message ----------
From: "Martin Kon??ek" <mkonicek12 at gmail.com>
Date: Mar 7, 2013 4:44 AM
Subject: mistake on Securing SSH
To: <timothy.ty.lee at gmail.com>
Cc:
Hi TImothy,
I saw wiki http://wiki.centos.org/HowTos/Network/SecuringSSH and it is
pretty good, but there is a mistake.
*Instead of having*
iptables
2018 Jun 05
2
Help attack DDOS
Server software firewall cannot help with ddos attacks.
Basically if those are indeed ddos attacks you’ll have to look into
mitigation solutions which are quite expensive. CloudFlare won’t work as
well since they do not support streaming.
You should consider getting a server at a data center which provide ddos
mitigation, I know that OVH’s mitigation is quite good.
בתאריך יום ג׳, 5 ביוני 2018
2018 Jun 05
0
Help attack DDOS
may be this url can help
https://icecast.imux.net/viewtopic.php?p=7084&sid=6ce1e17b6ad49e0a24be0e60b526f760
"
[image: Post]
<https://icecast.imux.net/viewtopic.php?p=7579&sid=149783b084f48b41a22bfe472e82d97a#7579>Posted:
Mon Jan 29, 2007 12:14 pm Post subject: [image: Reply with quote]
2015 Dec 29
1
Firewall trouble?
Alright, I have setup the new rules and am waiting to see if I have any
issues. If I do, I will keep working on it. I also read the article
below, which mentions exactly what you I was told about 2008 and newer
using different ports.
https://support.microsoft.com/en-us/kb/929851
Here is the new configuration:
root at dc01:~# iptables -S
-P INPUT DROP
-P FORWARD DROP
-P OUTPUT ACCEPT
-A INPUT -m
2019 Oct 09
2
[Bug 1370] New: iptables-restore-translate
https://bugzilla.netfilter.org/show_bug.cgi?id=1370
Bug ID: 1370
Summary: iptables-restore-translate
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
Reporter:
2011 Apr 04
6
sshd: Authentication Failures: 137 Time(s)
Hi,
to prevent scripted dictionary attacks to sshd
I applied those iptables rules:
-A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -m recent
--update --seconds 60 --hitcount 4 --name SSH --rsource -j DROP
-A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -m recent --set
--name SSH --rsource
And this is part of logwatch:
sshd:
Authentication Failures:
unknown
2003 Jun 01
1
[Bug 58] save() function of libipt_recent.c broken
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=58
email@cs-ware.de changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |REOPENED
Resolution|FIXED |
------- Additional Comments From email@cs-ware.de 2003-06-01
2015 Dec 28
0
Firewall trouble?
On 28/12/15 15:33, Ryan Ashley wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>
> I recently tried adding a firewall to my Samba 4 server using the port
> information I found on the wiki. Below is a dump of the resulting rules.
>
> root at dc01:~# iptables -S
> - -P INPUT DROP
> - -P FORWARD DROP
> - -P OUTPUT ACCEPT
> - -A INPUT -m conntrack --ctstate
2015 Dec 28
0
Firewall trouble?
On 12/28/2015 10:33 AM, Ryan Ashley wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>
> I recently tried adding a firewall to my Samba 4 server using the port
> information I found on the wiki. Below is a dump of the resulting rules.
>
> root at dc01:~# iptables -S
> - -P INPUT DROP
> - -P FORWARD DROP
> - -P OUTPUT ACCEPT
> - -A INPUT -m conntrack
2015 Dec 29
0
Firewall trouble?
Hai,
Im missing a few things.
And maybe time server port to open? Are your dc's time server also?
These are the ports i've set.
TCP what im having.
22,42,53,88,135,139,389,445,464,636,3268,3269,1024:5000,49612:65535
How you did:
22,53,88,135,139,445,464,636,1024:5000,3268,3269
Your missing 42 389 and range : 49612:65535
UDP what im having.
53,67,68,88,123,137,138,389,464
How you
2015 Dec 29
1
Firewall trouble?
I just looked up 42 and 68. I do not use WINS or BOOTP. I am removing
range 1024-5000 and replacing it with 49612-65535 now. I already allowed
389 TCP.
Lead IT/IS Specialist
Reach Technology FP, Inc
On 12/29/2015 03:58 AM, L.P.H. van Belle wrote:
> Hai,
>
> Im missing a few things.
>
> And maybe time server port to open? Are your dc's time server also?
> These are the
2007 Oct 10
0
How to use rate limit with marks set on packets with own queue???
Hi
After several days testing and studing howtos and docu again ...
I want to limit all tcp trafic with the limit module to say
one connection per second except some known trafic.
(This is because of using p2p progs gets mi crazy which gets my adsl
modem down
and I share my net with some users and because of encryption of stream
l7 does not work ...)
As I understand the limit module does work
2016 Aug 13
0
[CentOS6] Manually configured Firewall (WLAN-AP plus Router)
Hello
I've got this Mini-PC
https://www.zotac.com/product/mini_pcs/zbox-ci323-nano
everything is fine -> latest 6.8 kernel works;
both Ethernet-Interfaces work and also the WLAN-Interface works;
the two Ethernet-Interfaces are eth0 and eth1
the WLAN-Interface is wlan0
eth1 is connected on ISP side
eth0 is connected on my LAN side to a switch;
and wlan0 shall also be on my LAN side f?r
2015 Dec 28
9
Firewall trouble?
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
I recently tried adding a firewall to my Samba 4 server using the port
information I found on the wiki. Below is a dump of the resulting rules.
root at dc01:~# iptables -S
- -P INPUT DROP
- -P FORWARD DROP
- -P OUTPUT ACCEPT
- -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 22 -m state --state NEW -m
2018 Jun 05
2
Help attack DDOS
I ask because I only receive attacks when I activate icecast. I can not do
anything at the application level ?. i used ubuntu server 16.04. thanks.
2018-06-05 14:52 GMT-05:00 Alejandro Flores <alex at mordormx.net>:
> I think you should contact to your connectivity provider, hopefully they
> can provide you the Anti DDOS protection.
>
>
> On Tue, Jun 5, 2018 at 2:16 PM,
2013 May 30
0
[Bug 772] Rate Limiting
https://bugzilla.netfilter.org/show_bug.cgi?id=772
Phil Oester <netfilter at linuxace.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |netfilter at linuxace.com
--- Comment #1 from Phil Oester <netfilter at linuxace.com> 2013-05-30
2013 May 30
0
[Bug 772] Rate Limiting
https://bugzilla.netfilter.org/show_bug.cgi?id=772
Phil Oester <netfilter at linuxace.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Priority|P5 |P2
Severity|blocker |normal
--
Configure bugmail:
2013 Jun 10
0
[Bug 772] Rate Limiting
https://bugzilla.netfilter.org/show_bug.cgi?id=772
Phil Oester <netfilter at linuxace.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |WORKSFORME
--- Comment #2 from Phil Oester
2004 Feb 07
0
Re: IPFIREWALL
Hi,
I dont think you can deny all ddos against your box, you will need help from
your isp.
That is because if a person sends you enough packets, like 1mbit (and your
line is 1mbit)
full of packets, your connection is stuck, whether you filter or not.
Though you can mitigate those by closing all non needed ports, log them if
any attempt is being
made to connect to them, and use a bogon list which
2012 Aug 20
2
DDoS
I know someone who for the past 4 days has been having the heck ddosed out of him. He runs a gaming server, and ran a report on the ddos; he has 8 pages of that and a few hours ago there were 16 pages. They''re attacking his machine on random ports and he blocks UDP traffic on those ports, but they keep attacking on other ports. So far he''s banned over 800,000 IP''s.