Package: iptables
Version: 1.3.3-2
Followup-For: Bug #272729

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Manpage of Iptables show
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
recent
       Allows you to dynamically create a list of IP addresses and then
match against that list in a few different  ways.

       For  example,  you can create a ‘badguy’ list out of people
attempting to connect to port 139 on your firewall and
       then DROP all future packets from them without considering them.

       --name name
              Specify the list to use for the commands. If no name is
given then ’DEFAULT’ will be used.

       [!] --set
              This will add the source address of the packet to the
list. If the source address is already in  the  list,
              this will update the existing entry. This will always
return success (or failure if ‘!’ is passed in).

       [!] --rcheck
              Check if the source address of the packet is currently in
the list.

       [!] --update
              Like --rcheck, except it will update the "last seen"
timestamp if it matches.

       [!] --remove
              Check  if  the source address of the packet is currently
in the list and if so that address will be removed
              from the list and the rule will return true. If the
address is not found, false is returned.

       [!] --seconds seconds
              This option must be used in conjunction with one of
- --rcheck or --update. When used, this will  narrow  the
              match  to only happen when the address is in the list and
was seen within the last given number of seconds.

       [!] --hitcount hits
              This option must be used in conjunction with one of
- --rcheck or --update. When used, this will  narrow  the
              match to only happen when the address is in the list and
packets had been received greater than or equal to
              the given value. This option may be used along with
- --seconds to create an even narrower match requiring  a
              certain number of hits within a specific time frame.

- --rttl This  option  must be used in conjunction with one of --rcheck or
- --update. When used, this will narrow the
              match to only happen when the address is in the list and
the TTL of the current packet matches that of  the
              packet  which  hit  the --set rule. This may be useful if
you have problems with people faking their source
              address in order to DoS you via this module by disallowing
others access to  your  site  by  sending  bogus
              packets to you.

       Examples:

              # iptables -A FORWARD -m recent --name badguy --rcheck
              # --seconds 60 -j DROP

              # iptables -A FORWARD -p tcp -i eth0 --dport 139 -m recent
              # --name badguy --set -j DROP

       Official website (http://snowman.net/projects/ipt_recent/) also
has some examples of usage.

       /proc/net/ipt_recent/* are the current lists of addresses and
information about each entry of each list.

       Each  file  in  /proc/net/ipt_recent/  can be read from to see
the current list or written two using the following
       commands to modify the list:

       echo xx.xx.xx.xx > /proc/net/ipt_recent/DEFAULT
              to Add to the DEFAULT list

       echo -xx.xx.xx.xx > /proc/net/ipt_recent/DEFAULT
              to Remove from the DEFAULT list

       echo clear > /proc/net/ipt_recent/DEFAULT
              to empty the DEFAULT list.

       The module itself accepts parameters, defaults shown:

       ip_list_tot=100
              Number of addresses remembered per table

       ip_pkt_list_tot=20
              Number of packets per address remembered

       ip_list_hash_size=0
              Hash table size. 0 means to calculate it based on
ip_list_tot, default: 512

       ip_list_perms=0644
              Permissions for /proc/net/ipt_recent/* files

       debug=0
              Set to 1 to get lots of debugging info
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
But,
# iptables -m recent --help
show this:
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
recent v1.3.3 options:
[!] --set                       Add source address to list, always
matches.
[!] --rcheck                    Match if source address in list.
[!] --update                    Match if source address in list, also
update last-seen time.
[!] --remove                    Match if source address in list, also
removes that address from list.
    --seconds seconds           For check and update commands above.
                                Specifies that the match will only occur
if source address last seen within
                                the last 'seconds' seconds.
    --hitcount hits             For check and update commands above.
                                Specifies that the match will only occur
if source address seen hits times.
                                May be used in conjunction with the
seconds option.
    --rttl                      For check and update commands above.
                                Specifies that the match will only occur
if the source address and the TTL
                                match between this packet and the one
which was set.
                                Useful if you have problems with people
spoofing their source address in order
                                to DoS you via this module.
    --name name                 Name of the recent list to be used.
DEFAULT used if none given.
    --rsource                   Match/Save the source address of each
packet in the recent list table (default).
    --rdest                     Match/Save the destination address of
each packet in the recent list table.
ipt_recent v0.3.1: Stephen Frost <[EMAIL PROTECTED]>.
http://snowman.net/projects/ipt_recent/
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

- -- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.13-1-amd64-k8
Locale: LANG=pt_BR.UTF-8, LC_CTYPE=pt_BR.UTF-8 (charmap=UTF-8)

Versions of packages iptables depends on:
ii  libc6                         2.3.5-7    GNU C Library: Shared libraries an

iptables recommends no packages.

- -- no debconf information

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFDZ17UidffdjWZJQERAnh6AJ9FOVVsQ0Yv4acpb1r8ApPsoQzLaACePHLi
WkeI/q7Ew/LmnZD9i9CPPQc=
=f4g4
-----END PGP SIGNATURE-----

Reply via email to