Re: SSH Brute force attacks

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello Taylor and Åukasz.

Can anybody explain me you are using such combination of rules.

17 ÐÐÐ 2005 16:44 Åukasz Hejnak wrote:
> No problem, here's my variation, based on Taylor Grant's ruleset
> $ipt -A SSH_Brute_Force -m recent --set --name SSH
> $ipt -A SSH_Brute_Force -m recent ! --rcheck --name SSH --seconds 60
> --hitcount 3 -j RETURN 

Why this update here (see below)?

> $ipt -A SSH_Brute_Force -m recent --name SSH --update
> $ipt -A SSH_Brute_Force -j DROP
	
Every time packet passed --set rule it updates SSH. So if drop this rule, 
nothing changes. Or am I wrong? Is there any idea behind this that I missed.

Thank you for you attention,
-- 
Peter.



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux