I am trying to use the recent module to block all traffic from policy violators. I have got it working to ignore people who get ping happy, but I cannot seem to get it to work for bad packets.... Any ideas where I screwed up? Docs I should read? Pat # Generated by iptables-save v1.3.5 on Wed Aug 22 08:21:20 2007 *mangle :PREROUTING ACCEPT [0:0] :POSTROUTING ACCEPT [0:0] :LOGACTTCP - [0:0] :LOGACTTCPUS - [0:0] -A PREROUTING -p tcp -m tcp --tcp-flags ACK,URG URG -m recent --set --name SCAN --rsource -j LOGACTTCP -A PREROUTING -p tcp -m tcp --tcp-flags FIN,ACK FIN -m recent --set --name SCAN --rsource -j LOGACTTCP -A PREROUTING -p tcp -m tcp --tcp-flags FIN,RST FIN,RST -m recent --set --name SCAN --rsource -j LOGACTTCP -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN FIN,SYN -m recent --set --name SCAN --rsource -j LOGACTTCP -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,PSH,URG -m recent --set --name SCAN --rsource -j LOGACTTCP -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,SYN,RST,ACK,URG -m recent --set --name SCAN --rsource -j LOGACTTCP -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG FIN,SYN,RST,PSH,ACK,URG -m recent --set --name SCAN --rsource -j LOGACTTCP -A PREROUTING -p tcp -m tcp --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE -m recent --set --name SCAN --rsource -j LOGACTTCP -A PREROUTING -p tcp -m tcp --tcp-flags PSH,ACK PSH -m recent --set --name SCAN --rsource -j LOGACTTCP -A PREROUTING -p tcp -m tcp --tcp-flags SYN,RST SYN,RST -m recent --set --name SCAN --rsource -j LOGACTTCP -A LOGACTTCP -j LOG --log-prefix "Bad TCP DROP: " -A LOGACTTCP -j DROP COMMIT # Completed on Wed Aug 22 08:21:20 2007 # Generated by iptables-save v1.3.5 on Wed Aug 22 08:21:20 2007 *filter :INPUT DROP [0:0] :FORWARD DROP [0:0] :OUTPUT DROP [0:0] -A INPUT -i lo -j ACCEPT -A INPUT -p tcp -m tcp --dport 113 -j REJECT --reject-with tcp-reset -A INPUT -m conntrack --ctstate INVALID -j DROP -A INPUT -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -m state --state NEW -j DROP -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT -A INPUT -m recent --update --seconds 600 --rttl --name SCAN --rsource -j DROP -A INPUT -m recent --update --seconds 60 --rttl --name PINGABUSE --rsource -j DROP -A INPUT -p tcp -m tcp --dport 80 -m state --state NEW -j ACCEPT -A INPUT -p tcp -m tcp --dport 22 -m state --state NEW -j ACCEPT -A INPUT -p icmp -m icmp --icmp-type 8 -m recent --set --name PINGER --rsource -A INPUT -p icmp -m icmp --icmp-type 8 -m recent --update --seconds 5 --hitcount 10 --rttl --name PINGER --rsource -j LOG --log-prefix "Ping abuse " -A INPUT -p icmp -m icmp --icmp-type 8 -m recent --update --seconds 5 --hitcount 10 --rttl --name PINGER --rsource -j PINGBLOCK -A INPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT -A INPUT -j LOG --log-prefix "Default DROP (INPUT): " -A INPUT -j DROP -A FORWARD -j LOG --log-prefix "Default DROP (FORWARD): " -A FORWARD -j DROP -A OUTPUT -m state --state RELATED,ESTABLISHED -j ACCEPT -A OUTPUT -o lo -j ACCEPT -A OUTPUT -p tcp -m tcp --dport 53 -m state --state NEW -j ACCEPT -A OUTPUT -p udp -m udp --dport 53 -m state --state NEW -j ACCEPT -A OUTPUT -p icmp -m icmp --icmp-type any -j ACCEPT -A OUTPUT -j LOG --log-prefix "Default DROP (OUTPUT): " -A OUTPUT -j DROP -A PINGBLOCK -m recent --set --name PINGABUSE --rsource -j DROP COMMIT # Completed on Wed Aug 22 08:21:20 2007