RE: This rule doesn't work!...

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



I guess my question would be why are you using rate limiting on a spoofed
source IP address?  Why not take them all out.  I would set that rule up
first and get it working.  Then if you wanted to play around with limiting
(for what ever reason), then do that.  The LIMIT target can sometimes be
difficult to get it to do what you want it to do, or think it should do.  

-----Original Message-----
From: netfilter-admin@xxxxxxxxxxxxxxxxxxx
[mailto:netfilter-admin@xxxxxxxxxxxxxxxxxxx] On Behalf Of caruso bruno
Sent: Tuesday, November 11, 2003 10:45 AM
To: netfilter@xxxxxxxxxxxxxxxxxxx
Subject: This rule doesn't work!...

Hi

I have seen recently that I had many attempt connection from source address
127.0.0.1, source port 80. 

I had theses rules in my list:
iptables -A INPUT -i ppp0 -s "127.0.0.0/8" -m limit --limit 30/m -j LOG
--log-prefix "iptable NO_ROUTABLE_ADDR "
iptables -A INPUT -i ppp0 -s "127.0.0.0/8" -j DROP

I haven't any log in syslog just for this rule otherwise everything goes
well. 
I don't understand why theses rules doesn't work.

Best regards

Bruno





[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux