similar to: ip rule to block ssh attack

Displaying 20 results from an estimated 3000 matches similar to: "ip rule to block ssh attack"

2005 Sep 06
1
wine20050830 - can't run anything
Hi, I've had an older installation (taken from the Mandriva distro) that worked ok with some glitches, that I hoped will be partially eliminated with the newer version. I've succesfully compiled and installed the latest version. However when trying to run an application I receive following error: Protocol error:0x819cff0: no reply fd for request 7 what went wrong? CUIN Kaczy
2005 Aug 31
1
using different config files
Hi, I'd like to use different config files for two of my applications can I do it via some commandline option? The issue is with a dll file being used natively or builtin. One app need it the other way then the rest. CUIN Kaczy
2005 Oct 07
1
default font size
Hi, since 20050628 (or slighlty earlier) the wine.config was obsoleted in favor of winecfg. However I can't find there a [font] section. How can I change the default system font, or more precisely change the resolution, so the letters would be bigger? CUIN Kaczy
2005 Jun 30
0
samba 3.1 Mandrake 10.2
Hi I tried to search for the aneswer but this is simply to much to browse. And I am quite newbie. Problem: I created a public share, onto which I can log no problem, however I'd like to have homedirs available. I added few of the users I want to have this feature to smbpasswd but can't log in. The critical switch is a map to guest, as soon as I switch it from bad user to anything else.
2005 Oct 07
1
epoll_ctl: Operation not permitted
Hi, I'm not exactly sure that this is caused by wine. But maybe someone have already met this. I have wine 20050628 setup on Mandriva Linux 10.2. I am seeing the stream of epoll_ctl: Operation not permitted in the .xsession-errors It take about a day to fill a 10G partition I think it is connected with audio card, so I switched off the audio system in wine (I don't need it anyway),
2005 Aug 22
0
resetting wine cache
Hi, I have strange problem with wine. (Mandrake 10.2, wine 20050725, KDE3.3) I have a windows app that I want to run under linux (obviously), and I managed to run it. It is a report browser/generator made with Visual Objects. CA-Ret they call it. I can browse, and edit reports perfectly, but I can't display it. Or to put it otherwise, no matter what I do I am always receiving the very
2011 Jan 27
2
centos 5.5: iptables: module recent
Hello, I have well performing iptables in centos 5.2 and 5.3 : -A INPUT -m state --state NEW -m recent --update --seconds 60 --hitcount 1000 -p tcp --dport 25 -j LOG --log-prefix "FW DROP IP Flood: " Centos 5.5, updated today: Without -hitcount : iptables accept the line Including -hitcount : iptables brings an error message: Applying iptables firewall rules: iptables-restore:
2018 Jun 05
0
Help attack DDOS
may be this url can help https://icecast.imux.net/viewtopic.php?p=7084&sid=6ce1e17b6ad49e0a24be0e60b526f760 " [image: Post] <https://icecast.imux.net/viewtopic.php?p=7579&sid=149783b084f48b41a22bfe472e82d97a#7579>Posted: Mon Jan 29, 2007 12:14 pm Post subject: [image: Reply with quote]
2013 Mar 07
1
Fwd: mistake on Securing SSH
This was sent to me regarding the wiki. ---------- Forwarded message ---------- From: "Martin Kon??ek" <mkonicek12 at gmail.com> Date: Mar 7, 2013 4:44 AM Subject: mistake on Securing SSH To: <timothy.ty.lee at gmail.com> Cc: Hi TImothy, I saw wiki http://wiki.centos.org/HowTos/Network/SecuringSSH and it is pretty good, but there is a mistake. *Instead of having* iptables
2018 Jun 05
2
Help attack DDOS
Server software firewall cannot help with ddos attacks. Basically if those are indeed ddos attacks you’ll have to look into mitigation solutions which are quite expensive. CloudFlare won’t work as well since they do not support streaming. You should consider getting a server at a data center which provide ddos mitigation, I know that OVH’s mitigation is quite good. בתאריך יום ג׳, 5 ביוני 2018
2003 Jun 01
1
[Bug 58] save() function of libipt_recent.c broken
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=58 email@cs-ware.de changed: What |Removed |Added ---------------------------------------------------------------------------- Status|RESOLVED |REOPENED Resolution|FIXED | ------- Additional Comments From email@cs-ware.de 2003-06-01
2005 Mar 01
1
Logging patch
Hi, I''ve attached a patch which fixes a logging problem with log_rule_limit in custom actions. E.g. this action: ,----[ Whitelist ] | if [ -n "$LEVEL" ]; then | run_iptables -N ${CHAIN}Add | log_rule_limit $LEVEL ${CHAIN}Add WhitelistAdd DROP "$LOG_LIMIT" $TAG | run_iptables -A ${CHAIN}Add -j DROP | run_iptables -N ${CHAIN}Del | log_rule_limit
2012 Jun 11
1
iptables: hitcount
Hello, up to CentOS 5.3 it was possible, to control new ip connections by "recent", "seconds" and "hitcount" -A INPUT -m state --state NEW -m recent --set -p tcp --dport 80 -A INPUT -m state --state NEW -m recent --update --seconds 60 --hitcount 1000 -p tcp --dport 80 -j LOG --log-prefix "FW DROP IP Flood: " -A INPUT -p tcp -m tcp --dport 80 -m state
2006 Apr 11
0
[Bug 469] New: recent match doesn't triger with --hitcount > 20
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=469 Summary: recent match doesn't triger with --hitcount > 20 Product: netfilter/iptables Version: linux-2.6.x Platform: i386 OS/Version: other Status: NEW Severity: normal Priority: P2 Component: ip_tables (kernel) AssignedTo:
2009 Dec 22
2
IPTABLES --hitcount maximum value
Is the maximum permitted value for --hitcount documented anywhere? I reliably get a iptables-restore error when I specify a hitcount value greater than 20 but I cannot find any mention of there being a maximum value. -- *** E-Mail is NOT a SECURE channel *** James B. Byrne mailto:ByrneJB at Harte-Lyne.ca Harte & Lyne Limited
2009 Aug 16
1
to filter dos ip using iptables recent
Hello, all. I read this document about iptables recent module. http://blog.andrew.net.au/2005/02/16#ipt_recent_and_ssh_attacks and I would like to filter the excessive spam mail sending ip address by iptables recent module. and some questions. iptables -A INPUT -p tcp --dport 25 -m state --state NEW -m recent --set --name SPAM iptables -A INPUT -p tcp --dport 25 -m state --state NEW -m
2017 Apr 25
3
Problems with S4 methods dispatching on `...` (aka dotsMethods)
I attempted to fix it, and that example seems to work for me. It's also a (passing) regression test in R. Are you sure you're using a new enough R-devel? On Tue, Apr 25, 2017 at 2:34 AM, Andrzej Ole? <andrzej.oles at gmail.com> wrote: > Hi Michael, > > thanks again for your patch! I've tested it and I'm happy to confirm that > `callNextMethod()` works with
2008 Aug 19
4
Simple IPTABLES Question
I added these rules to IPTABLES to slow brute force attacks. iptables -A INPUT -p tcp --dport 22 -s my_subnet/24 -j ACCEPT iptables -A INPUT -p tcp --dport 22 -m state --state NEW -m recent --set --name SSH iptables -A INPUT -p tcp --dport 22 -m state --state NEW -m recent --update --seconds 60 --hitcount 5 --rttl --name SSH -j DROP I would like log entries when connections are dropped to see
2017 Aug 07
1
Problems with S4 methods dispatching on `...` (aka dotsMethods)
I ported that over. On Tue, Aug 1, 2017 at 5:50 AM, Andrzej Ole? <andrzej.oles at gmail.com> wrote: > Thank you Michael for updating the 3.4 branch, the `callNextMethod()` now > works for `...` methods as expected. However, I'm still missing your other > patch fixing the handling of arguments in `...` methods. It would be really > great if this bugfix could be integrated
2017 Apr 21
2
Problems with S4 methods dispatching on `...` (aka dotsMethods)
Great, thanks Michael for you quick response! I started off with a question on SO because I was not sure whether this was an actual bug or I was just missing something obvious. I'm looking forward to the patch. Cheers, Andrzej On Thu, Apr 20, 2017 at 10:28 PM, Michael Lawrence < lawrence.michael at gene.com> wrote: > Thanks for pointing out these issues. I have a fix that I will