Yes I have a wonderful script doing that for SSH but not for iptables.

For Bind, I must say that this problem appears 2-3 times a month, I can therefore manage it manually for the moment...

Denis

Le 04.08.2010 14:36, Sten Carlsen a écrit :
  You may want to consider how to trigger removal of this blocking when
the problem has gone away and the address is again used responsibly.

Maybe add a log statement with a limitation of one per day and checking
that this is no longer seen for some time? IPTABLES can do the logging.

On 04/08/10 11:00, Denis BUCHER wrote:
Le 03.08.2010 21:25, Kevin Darcy a écrit :
I would like to know if I can block hosts doing that at the level of
/etc/hosts.allow or should I do it at the level of Bind itself ?
Use IPTables or add rules to your firewall. I don't believe that BIND
pays any attention to /etc/hosts.allow

Yes I tried iptables, it is working perfectly, and /etc/hosts.allow
does not look to be working. This was pefect :

iptables -I INPUT 3 -p tcp -s 202.152.172.4 --dport 53 -j DROP

I'm no iptables experts, but doesn't that only apply to TCP packets?

Dear Kevin,

Yes sorry, in fact I also should add a rule for UDP :

iptables -I INPUT 3 -p udp -s 202.152.172.4 --dport 53 -j DROP

Or : (all ports)

iptables -I INPUT 3 -s 202.152.172.4 -j DROP


Denis
_______________________________________________
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to