next topic: --limit and --burst-limit

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> >   from one tutorial, here's the lines that deal with 
> > syn-flooding protection:
> > 
> >   iptables -N syn-flood
> >   iptables -A INPUT -i $IFACE -p tcp --syn -j syn-flood
> >   iptables -A syn-flood -m limit --limit 1/s --limit-burst 
> 4 -j RETURN
> >   iptables -A syn-flood -j DROP

I've just been playing with that, too.

Well, I couldn't stop scans like
nmap -sS -P0 -T Insane ip.address -p 21,22,25,80

However, 'nmap -sS -P0 -T Polite ip.address' works fine with this --limit
specification above.

How am I going to stop something like that?



Thanks,
philipp



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux