is the iptables recent module being blocked or inhibited somehow by astlinux?
it is a most useful resource for detecting, counting inbound access attempts over a time interval, and eliminating multiple attacks from any given port or protocol, as I should imagine most of the users here should (emphasis SHOULD) already know.... kernel module inspection shows that it is present.... we use our own iptables settings -- anyone who understands security would not do anything less without complete and independently verifiable and regression tested results from any proposed solution... so anything arno is disabled presently... new connections that meet the recent module criteria for setting their IP adress in the file table seem to be completley ignored, as are (or course, given the preceeding) the conditions to automatically drop further packets from the given undesireable IP do you have thousands of ssh or sip-5060 attacks when you use astlinux? if so, they could be prevented, but somehow it is not allowed. why is this? - ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Compuquest, Inc. www.compuquestinc.com Tel: 630-405-0740 Fax: 773-782-5228 Since 1983 Innovative Technology Solutions ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ------------------------------------------------------------------------------ The modern datacenter depends on network connectivity to access resources and provide services. The best practices for maximizing a physical server's connectivity to a physical network are well understood - see how these rules translate into the virtual world? http://p.sf.net/sfu/oracle-sfdevnlfb _______________________________________________ Astlinux-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/astlinux-users Donations to support AstLinux are graciously accepted via PayPal to [email protected].
