I don't follow... that is not my entire ruleset, but everything for the
brute force is there..

On Fri, Oct 17, 2008 at 8:21 PM, Pascal Hambourg <
[EMAIL PROTECTED]> wrote:

> Hello,
>
> Stephen Vaughan a écrit :
>
>  I have a ruleset which works for blocking brute force attempts on port 21,
>> but I'm not sure how to open port 21 without exluding the rules, ie:
>>
>> # default
>> $IPTABLES -P INPUT DROP
>>
>> # when this rule is enabled it doesn't go any further since it's a match,
>> so
>> how do I get it to allow the port to be open, but also run through the
>> brute
>> force tables?
>> $IPTABLES -A INPUT -p tcp --dport 21 -j ACCEPT
>>
>> $IPTABLES -N FTP2
>> $IPTABLES -N FTPBF
>> $IPTABLES -N FTPNEW
>> $IPTABLES -A FTP2 -p tcp -m tcp --dport 21 -m state --state NEW -j FTPNEW
>> $IPTABLES -A FTP2 -m recent --set --name FTPBLOCK --rsource
>> $IPTABLES -A FTP2 -j LOG --log-prefix "FTP BRUTE FORCE: " --log-level 6
>> $IPTABLES -A FTP2 -j DROP
>> $IPTABLES -A FTPBF -p tcp -m tcp --dport 21 -j DROP
>> $IPTABLES -A FTPNEW -m recent --rcheck --name FTPBLOCK --rsource -j FTPBF
>> $IPTABLES -A FTPNEW -m recent --set --name FTP --rsource
>> $IPTABLES -A FTPNEW -m recent --update --seconds 120 --hitcount 6 --name
>> FTP
>> --rsource -j FTP2
>>
>
> You are not giving us the full picture. How are these chains called ?
>
> [Be aware that the 'recent' match can be circumvented or abused to cause a
> DoS. You might consider using tools based on authentication failure such as
> fail2ban instead.]
>
>
> --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact
> [EMAIL PROTECTED]
>
>


-- 
Best Regards,
Stephen

Reply via email to