ok correction, this is the proper ruleset:

$IPTABLES -A INPUT -p tcp -m tcp --dport 21 -m state --state NEW -j FTPNEW
$IPTABLES -A FTP2 -m recent --set --name FTPBLOCK --rsource
$IPTABLES -A FTP2 -j LOG --log-prefix "FTP BRUTE FORCE: " --log-level 6
$IPTABLES -A FTP2 -j DROP
$IPTABLES -A FTPBF -p tcp -m tcp --dport 21 -j DROP
$IPTABLES -A FTPNEW -m recent --rcheck --name FTPBLOCK --rsource -j FTPBF
$IPTABLES -A FTPNEW -m recent --set --name FTP --rsource
$IPTABLES -A FTPNEW -m recent --update --seconds 120 --hitcount 6 --name FTP
--rsource -j FTP2

first rule is different, so again, this doesn't open port 21, where do I
need to place a rule like --dport 21 -j ACCEPT?

On Sat, Oct 18, 2008 at 12:57 AM, Pascal Hambourg <
[EMAIL PROTECTED]> wrote:

> Stephen Vaughan a écrit :
>
>> I don't follow... that is not my entire ruleset, but everything for the
>> brute force is there..
>>
>
> No it's not. In order to be effective, user-defined chains have to be
> called by another rule from a built-in chain (INPUT, OUTPUT, FORWARD...),
> and I do not see such a rule here.
>
>
>
> --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact
> [EMAIL PROTECTED]
>
>


-- 
Best Regards,
Stephen

Reply via email to