[LARTC] Suspicious Attachment

2005-03-23 Thread virus_warning
-- Warning: Message delivery wasn't performed. Reason: Our virus scanner detected very suspicious code in the attachment of a mail addressed to a user of our system. The following message will not be delivered: From: [EMAIL PROT

[LARTC] tc + zebra/quagga

2005-03-23 Thread Lorin
I have some problem with traffic shaping on debian testing. I actually posted a full config on the list a while ago but didn't get any answers. The problem is that traffic doesn't get into the user classes (~150) when I associate a class with a qdisc. I tried sfq, fifo but none works. If I don

Re: [LARTC] limiting bandwidth on iface

2005-03-23 Thread Brian Carrig
Marcus, I'm a little confused. Downstream is 1mbit and upstream is 128kbit but the root limit in your code is 1mbit. Surely this could be the cause of your problem? Regards Brian On 23 Mar 2005 at 14:33, Marcus Fritzsch wrote: > ~ 27 # shapiung class of root --> not more than 1mbit b

[LARTC] limiting bandwidth on iface

2005-03-23 Thread Marcus Fritzsch
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi there! Well, as an exercise, I try 'simulating' an adsl link (just the speed ;o)) with a GRE tunnel and HTB for bandwidth limiting. Typically in germany adsl has about 1024kbit downstream and 128kbits upstream (yes, there are others ;) but these are

Re: [LARTC] syn flood protection - inside initiated attacks

2005-03-23 Thread Nguyen Dinh Nam
IMO, you have to --limit for each of the computer separately (1 chain for each IP address), otherwise you will block both the instruder and the legitimate users. Perhaps the better solution is to install an IDS and completely block instruder, wait until he/she contacts you and ask for worm remo

[LARTC] syn flood protection - inside initiated attacks

2005-03-23 Thread Ming-Ching Tiew
Perhaps someone will help me on this :- I have read a lot of examples of syn flood protect on the INPUT chain. That I have no question at all. I wonder if it make sense to perform syn flood protection at the FORWARD chain ? If packets are originated from a LAN worm, and are not targetted at the