Sorry, I re-read the error and it's more likely a match problem.  Try 
taking out the "-m udp":

iptables -A INPUT -p udp --dport 27015 -m length --length 28 -j DROP

     - Dave

David A. Parker wrote:
> It sounds like you either don't have a chain named INPUT, or you don't 
> have support for the DROP target.  Both of those are pretty standard 
> things to have.  If you are using a vendor-delivered version of iptables 
> (like a stock install from Red Hat or CentOS), you might have a chain 
> called RH-Firewall-1-INPUT or something like that, instead of INPUT.
> 
>      - Dave
> 
> Hüseyin Cerik wrote:
>> hello neph we tested this script one he gives a error
>>
>> iptables -A INPUT -p udp -m udp --dport 27015 -m length --length 28 -j DROP
>> ->>> iptables: No chain/target/match by that name
>>
>> can u help me ?
>>
>>
>>
>> Nephyrin Zey schrieb:
>>> Linux/iptables users- this firewall rule will completely stop the
>>> attack (tested):
>>> -A INPUT -p udp -m udp --dport 27015 -m length --length 28 -j DROP
>>>
>>> Repeat for any ports your servers run on besides 27015
>>>
>>> - Neph
>>>
> 

-- 

Dave Parker
Utica College
Integrated Information Technology Services
(315) 792-3229
Registered Linux User #408177


_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux

Reply via email to