Re: Port Scanner

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wednesday 05 November 2003 4:38 pm, tsh@xxxxxxxxxxxxxxxxx wrote:

> Not particularly packets of this type, but e.g. to put a rate-limit
> on incoming NEW connections, in order to help prevent a DoS attack
> on, say, a webserver or mailhub.

Indeed - that makes much more sense, yes.

Antony.

> >> I was thinking about just this the other night, and is seems to me that
> >> such a rule should be rejecting stuff which exceeds the rate limit
> >> rather than accepting stuff which doesnt exceed it, since the -j ACCEPT
> >> will mean that any subsequent rules in a FORWARD table wont be tested.
> >>
> >> Something like
> >>
> >> iptables -A FORWARD -p tcp --tcp-flags SYN,ACK,FIN,RST RST -m limit !
> >> limit 1/s -j DROP
> >
> >Why do people want to ACCEPT any packets of this type at all?   If a
> > packet is part of an ESTABLISHED connection then it is going to pass
> > through your FORWARD chain on the connection tracking rule; if a packet
> > is not part of an ESTABLISHED connection, then it's either a valid new
> > connection (in which case you ACCEPT it), or else it isn't (in which case
> > you don't ACCEPT it).
> >
> >I can't quite see why you would want to accept even a slow rate of such
> >
> >>packets.
> >
> >Regards,
> >
> >Antony.

-- 

If at first you don't succeed, destroy all the evidence that you tried.
                                                     Please reply to the list;
                                                           please don't CC me.


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux