hi, my iptables config can be reduced to the following example, which
let's ssh pass and drops everything else.

  iptables -P INPUT DROP
  iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
  iptables -A INPUT -p tcp --dport ssh -j ACCEPT
  iptables -A INPUT -j LOG

this works perfectly as i want it, but every now and then, i get
portscanned, and my kern.log grows like 14Mb in size because of that
LOG rule.

using the limitig features of iptables, i can say

  iptables -A INPUT -j LOG -m limit --limit 5/minute --limit-burst 5

to make it show a max. of 5/minute with an initial burst of 5.
however, this way, a lot of information will be lost. granted,
portscans can only be limited that way, but i am wondering if there's
a method to limit logs for a specific type of package (i.e. same
destination socket) only? like commercial products (e.g. FW-1) do. any
clues?

-- 
martin;              (greetings from the heart of the sun.)
  \____ echo mailto: !#^."<*>"|tr "<*> mailto:"; [EMAIL PROTECTED]
  
"may your future be limited only by your dreams."
                                                  -- christa mcauliffe

Attachment: pgpUB85N8lYHa.pgp
Description: PGP signature

Reply via email to