On Thu, Sep 18, 2003 at 12:33:01AM +0000, Bob Crandell wrote:
> How would you change:
> > iptables -A sort -j LOG --log-level info
> to limit the log size?

 iptables -A sort -m limit -j LOG --log-level info

This uses the defaults 3/hour for an average rate and 5 for a burst.
See the man page for other possibilities, such as the one below:
 
 iptables -A sort -m limit --limit 10/hour --limit-burst 10 -j LOG --log-level info


> I've some hints from each of the respondants and built an iptable
> script.  There is supposed to be only 3 or 4 ports open on this box.
> Can some of you guys with the know how check 216.239.175.248 and see
> what's open?  I just heard that there are going to be some ComCast
> uses banging on it and now I'm scared.
Don't think locally.  Anyone with an ip address can bang on it.  I'm
running a scan now.  Either the machine is off or it's not responding to
icmp.

> While reading through the man page, I saw a way to restrict access by MAC address.
> Can someone post an example?
I wouldn't do this, as it won't work well for being an internet server.

iptables -A FORWARD -s $intfw -m mac --mac-source XX:XX:XX:XX:XX:XX \
    -d ! $intnet -j ACCEPT

Forward anything coming from a specific internal ip (like an internal
firewall),  with mac address <xx> and going to somewhere other than the
internal network.

> So my original requirement to allow some networks and some IP
> addresses now includes some MAC addresses.  I'm assuming they would be
> added to the end of the list in the sort rule.  Yes?  No?

Who provided this requirement?  Why?  Is matching by ip not sufficient?  There are 
only special cases where I would use this module.

> Should I post the iptables script I have so far?
The scan is done.  Either the machine is down or the firewall is too
tight because there are no services available and I can't even get a
fingerprint.

$ sudo nmap -sS -v -O -P0 216.239.175.248

Starting nmap 3.27 ( www.insecure.org/nmap/ ) at 2003-09-18 09:56 PDT
Host 216.239.175.248 appears to be up ... good.
Initiating SYN Stealth Scan against 216.239.175.248 at 09:56
The SYN Stealth Scan took 492 seconds to scan 1623 ports.
Warning:  OS detection will be MUCH less reliable because we did not
find at least 1 open and 1 closed TCP port
All 1623 scanned ports on 216.239.175.248 are: filtered
Too many fingerprints match this host for me to give an accurate OS
guess
TCP/IP fingerprint:
SInfo(V=3.27%P=i686-pc-linux-gnu%D=9/18%Time=3F69E5C6%O=-1%C=-1)
T5(Resp=N)
T6(Resp=N)
T7(Resp=N)
PU(Resp=N)

Nmap run completed -- 1 IP address (1 host up) scanned in 506.213 seconds

So you probably should post your ruleset since it isn't working as you
had planned. 

Cory

-- 
Cory Petkovsek                                       Adapting Information
Adaptable IT Consulting                                Technology to your   
(541) 914-8417                                                   business
[EMAIL PROTECTED]                                  www.AdaptableIT.com
_______________________________________________
EuG-LUG mailing list
[EMAIL PROTECTED]
http://mailman.efn.org/cgi-bin/listinfo/eug-lug

Reply via email to