Sorry, I re-read the error and it's more likely a match problem. Try
taking out the "-m udp":
iptables -A INPUT -p udp --dport 27015 -m length --length 28 -j DROP
- Dave
David A. Parker wrote:
> It sounds like you either don't have a chain named INPUT, or you don't
> have support for the DROP target. Both of those are pretty standard
> things to have. If you are using a vendor-delivered version of iptables
> (like a stock install from Red Hat or CentOS), you might have a chain
> called RH-Firewall-1-INPUT or something like that, instead of INPUT.
>
> - Dave
>
> Hüseyin Cerik wrote:
>> hello neph we tested this script one he gives a error
>>
>> iptables -A INPUT -p udp -m udp --dport 27015 -m length --length 28 -j DROP
>> ->>> iptables: No chain/target/match by that name
>>
>> can u help me ?
>>
>>
>>
>> Nephyrin Zey schrieb:
>>> Linux/iptables users- this firewall rule will completely stop the
>>> attack (tested):
>>> -A INPUT -p udp -m udp --dport 27015 -m length --length 28 -j DROP
>>>
>>> Repeat for any ports your servers run on besides 27015
>>>
>>> - Neph
>>>
>
--
Dave Parker
Utica College
Integrated Information Technology Services
(315) 792-3229
Registered Linux User #408177
_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux