You can also add some standard things to block

# Reject packets from RFC1918 class networks (i.e., spoofed)
$IPT -A INPUT -s 10.0.0.0/8     -j DROP
$IPT -A INPUT -s 169.254.0.0/16 -j DROP
$IPT -A INPUT -s 172.16.0.0/12  -j DROP
$IPT -A INPUT -s 127.0.0.0/8    -j DROP
$IPT -A INPUT -s 224.0.0.0/4      -j DROP
$IPT -A INPUT -d 224.0.0.0/4      -j DROP
$IPT -A INPUT -s 240.0.0.0/5      -j DROP
$IPT -A INPUT -d 240.0.0.0/5      -j DROP
$IPT -A INPUT -s 0.0.0.0/8        -j DROP
$IPT -A INPUT -d 0.0.0.0/8        -j DROP
$IPT -A INPUT -d 239.255.255.0/24 -j DROP
$IPT -A INPUT -d 255.255.255.255  -j DROP

# Drop invalid packets immediately
$IPT -A INPUT   -m state --state INVALID -j DROP
$IPT -A FORWARD -m state --state INVALID -j DROP
$IPT -A OUTPUT  -m state --state INVALID -j DROP

# Drop bogus TCP packets
$IPT -A INPUT -p tcp -m tcp --tcp-flags SYN,FIN SYN,FIN -j DROP
$IPT -A INPUT -p tcp -m tcp --tcp-flags SYN,RST SYN,RST -j DROP

Philipp Reddigau skrev 2010-06-03 20:12:
> So,
> Maybe someone has more here the actual list:
>
> Specific length:
> iptables -A INPUT -p udp -m udp --dport 27015:29000 -m length --length 0 -j
> DROP
> iptables -A INPUT -p udp -m udp --dport 27015:29000 -m length --length 28 -j
> DROP
> iptables -A INPUT -p udp -m udp --dport 27015: 29000 -m length --length 39
> -j DROP
> iptables -A INPUT -p udp -m udp --dport 27015: 29000 -m length --length 48
> -j DROP
> iptables -A INPUT -p udp -m udp --dport 27015: 29000 -m length --length 105
> -j DROP
>
> Prevent Rcon Flood:
> iptables -A INPUT -p tcp -m tcp --dport 27015:29000 -m hashlimit
> --hashlimit-upto 2/sec --hashlimit-burst 1 --hashlimit-mode
> srcip,dstip,dstport --hashlimit-name TF_PACKET_LIMIT -j ACCEPT
>
> Generic UDP Flood:
> iptables -A whitelist -s 72.165.61.128/26 -j ACCEPT iptables -A whitelist -s
> 72.165.61.153/26 -j ACCEPT iptables -A whitelist -s 216.207.205.99/26 -j
> ACCEPT iptables -A whitelist -s 216.207.205.98/26 -j ACCEPT
> iptables -N UDPFILTER
> iptables -A INPUT -p udp -j UDPFILTER
> iptables -A UDPFILTER -j whitelist
> iptables -A UDPFILTER -m state --state ESTABLISHED -j ACCEPT iptables -A
> UDPFILTER -m state --state NEW -m hashlimit --hashlimit-mode dstip,dstport
> --hashlimit-name udplimit --hashlimit 300/second -j ACCEPT iptables -A
> UDPFILTER -j DROP
>
> Reject dead Masterserver: (Server is starting faster)
> iptables -A OUTPUT -d 68.142.88.34/32 -p tcp -m tcp --dport 27038 -j REJECT
> --reject-with icmp-port-unreachable
>
>
> Something more?
>
>
>
> _______________________________________________
> To unsubscribe, edit your list preferences, or view the list archives, please 
> visit:
> http://list.valvesoftware.com/mailman/listinfo/hlds_linux
>    


_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
http://list.valvesoftware.com/mailman/listinfo/hlds_linux

Reply via email to