[colug-432] IPtables
Tim Randles
tim.randles at gmail.com
Wed May 13 10:10:58 EDT 2015
Do you have an iptables rule ahead of that drop rule allowing SSH inbound?
On Wed, May 13, 2015 at 7:28 AM, Steve VanSlyck <s.vanslyck at postpro.net>
wrote:
> Hi.
>
> I have this rule set it IPTABLES:
>
> Chain INPUT (policy DROP 1 packets, 44 bytes)
> pkts bytes target prot opt in out source
> destination
>
> 4 212 DROP all -- * * 213.0.0.0/8
> 0.0.0.0/0
>
> However I still see attacks from 213.30.22.232 with username attempts in
> the log. It seems iptables is not dropping the connection if it gets to the
> point where submitting a user login name is allowed.
>
> Comments?
>
>
> _______________________________________________
> colug-432 mailing list
> colug-432 at colug.net
> http://lists.colug.net/mailman/listinfo/colug-432
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.colug.net/pipermail/colug-432/attachments/20150513/c11646dc/attachment-0001.html
More information about the colug-432
mailing list