Hello Cameron,

Monday, September 24, 2001, 2:02:25 AM, you wrote:

[...]
CS> Instead, why not make a special chain for Nimda, and only divert processing to
CS> it for incoming SYN packets aimed at port 80? That way almost everything
CS> else goes through your normal tiny set of rules, and only incoming HTTP
CS> connections incur the analysis penalty.

CS>         ipchains -I input -p tcp -y -d 0.0.0.0/0 http -j NIMDA

CS> and do the processing in the NIMDA chain.

Very good idea.  It would seem that most of the Nimda infected
machines on the same class networks have either been disconnected or
patched.  So this should now be a viable solution (with a lot less
than 2400 IPs).  Thanks for the tip!

-- 
Best regards,
 Brian Curtis



_______________________________________________
Seawolf-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/seawolf-list

Reply via email to