Marek Kierdelewicz wrote: > Hello, > > >> Thanks a lot, what about this ruleset ? >> iptables -A INPUT -p tcp --syn -m hashlimit \ >> --hashlimit 1/sec --hashlimit-burst 4 --hashlimit-htable-expire 300000 >> \ --hashlimit-mode srcip --hashlimit-name testlimit -j ACCEPT >> iptables -A INPUT -j DROP >> The concept here the blocked ip doing the syn-flood will be blacklisted >> for 5 min and will be checked again after that interval. >> > > I think it won't work as a blacklist just drop syns that are above > 1/sec. Option htable-expire is not for blacklisting but for setting > timeframe in which hashlimit is operating (eg. it won't work well if you > set htable-expire to 300s and have hashlimit set to 20/hour). To obtain > desired effect you can use recent module (great work by Stephen Frost > by the way): > > iptables -A INPUT -m recent --name blacklist --rcheck --seconds 300 \ > -j DROP > iptables -A INPUT -p tcp --syn -m hashlimit \ > --hashlimit 1/sec --hashlimit-burst 4 --hashlimit-htable-expire 300000\ > --hashlimit-mode srcip --hashlimit-name testlimit -j ACCEPT > iptables -A INPUT -m recent --name blacklist --set -j DROP > > You can find more information about recent here: > - http://snowman.net/projects/ipt_recent/ > - and in manpage; > > Best regards, > Marek > Dear Marek, millions and millions of thanks to you. You have provided the solution which I was searching since looong. a syn-flood protection along with IP-blacklist ( psad style arrangement) is something which I love to have in my servers. I think I can modify my DROP rules where ever required to pass it through blacklist as ```````````````````` iptables -A INPUT -m recent --name blacklist --set -j DROP `````````````````````` and place ````````````` iptables -A INPUT -m recent --name blacklist --rcheck --seconds 300 -j DROP ``````````````` at the beginning of my firewall rule set. A great learning for me. Marek once again thanks a lot. -- To unsubscribe from this list: send the line "unsubscribe netfilter" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html