Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here. |
Notices |
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Are you new to LinuxQuestions.org? Visit the following links:
Site Howto |
Site FAQ |
Sitemap |
Register Now
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
|
 |
09-19-2004, 08:03 AM
|
#1
|
Member
Registered: Aug 2002
Location: Alexandria
Distribution: ubuntu 12.04.2
Posts: 217
Rep:
|
block ip address/hosts
Grr...I've seen a couple of threads here about script kiddies trying to hack into systems.
I got a hostname of someone who was probing my root password. Some dork from .jp.
Is there a way that I can block their IP address from trying again? I'm not very familure with ipchains. I want somethink quick and painless.
(Aside: )
I would love to see a script that creates some sort of feedback loop; script kiddies attempt to hack, a deamon respons by hacking the kiddie with a DOS attack, making sure they won't compromise anyone else.
just a though. REVENGE OF THE GEEKS!
Viva la TUX!
Last edited by sohmc; 09-19-2004 at 08:04 AM.
|
|
|
09-19-2004, 08:39 AM
|
#2
|
Senior Member
Registered: Mar 2003
Location: Beautiful BC
Distribution: RedHat & clones, Slackware, SuSE, OpenBSD
Posts: 1,791
Rep:
|
Sohmc, with kernel 2.4 and up, iptables is the preferred firewall.
I am not sure if you already have any iptables rules set.
You can however add
iptables -A INPUT -i eth0 -s <dork's ip> -j DROP
and
iptables -A FORWARD -i eth0 -s <dork's ip> -j DROP
this should take care of DorkSan.
If you have any particular service under attack, say sshd, you can put an entry in your /etc/hosts.deny as
sshd: <dork's IP>
ALL: <dork's IP>
this will deny dork from accessing any of your services that are listening on the net.
|
|
|
09-19-2004, 08:41 AM
|
#3
|
Member
Registered: Aug 2002
Location: Alexandria
Distribution: ubuntu 12.04.2
Posts: 217
Original Poster
Rep:
|
thanks. Hopefully this will take care of that!
EDIT:
will iptables save this information and reload it? or do I need to add a line to my rc.local?
Last edited by sohmc; 09-19-2004 at 08:43 AM.
|
|
|
09-19-2004, 11:13 AM
|
#4
|
Senior Member
Registered: Mar 2003
Location: Beautiful BC
Distribution: RedHat & clones, Slackware, SuSE, OpenBSD
Posts: 1,791
Rep:
|
As I see Fedora core listed as your distribution, I assume you use Fedora core 1.
Do you already have any iptables rules?
You can check that by running the following command as root
/sbin/iptables -nvL
You can run
/sbin/iptables save
to save your iptables rules to be loaded at boot.
|
|
|
All times are GMT -5. The time now is 11:19 PM.
|
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.
|
Latest Threads
LQ News
|
|