It sounds like you either don't have a chain named INPUT, or you don't
have support for the DROP target. Both of those are pretty standard
things to have. If you are using a vendor-delivered version of iptables
(like a stock install from Red Hat or CentOS), you might have a chain
called RH-Firewall-1-INPUT or something like that, instead of INPUT.
- Dave
Hüseyin Cerik wrote:
> hello neph we tested this script one he gives a error
>
> iptables -A INPUT -p udp -m udp --dport 27015 -m length --length 28 -j DROP
> ->>> iptables: No chain/target/match by that name
>
> can u help me ?
>
>
>
> Nephyrin Zey schrieb:
>> Linux/iptables users- this firewall rule will completely stop the
>> attack (tested):
>> -A INPUT -p udp -m udp --dport 27015 -m length --length 28 -j DROP
>>
>> Repeat for any ports your servers run on besides 27015
>>
>> - Neph
>>
--
Dave Parker
Utica College
Integrated Information Technology Services
(315) 792-3229
Registered Linux User #408177
_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux