Author | Message |
---|---|
![]() |
|
inetquestion Replies: 11 Views: 219 |
![]() |
Tried log level on low & high, there is nothing there about dropped connections.
However, not concerned with figuring out why messages aren't logged in /var/log/messages as I've already parse ... |
|
![]() |
|
![]() |
|
inetquestion Replies: 11 Views: 219 |
![]() |
Doing this: grep -i drop /var/log/messages
results in lots of info about "authpriv.info dropbear". There is nothing there about dropped connections. Is there a reason to look here, ... |
|
![]() |
|
![]() |
|
inetquestion Replies: 11 Views: 219 |
![]() |
The contents change constantly... here is a snapshot.
Questions: - what causes these to appear - Is there any reason I shouldn't parse this list and block them permanently? |
|
![]() |
|
![]() |
|
inetquestion Replies: 11 Views: 219 |
![]() |
Looking at list of dropped connections in Log_incoming.asp
Are these entries due to port scanning? Is there any reason you shouldn't block entries found in this list permanently? |
|
![]() |
|
![]() |
|
inetquestion Replies: 1 Views: 96 |
![]() |
Is there a list of FW rules which can be added to iptables to bolster security. Would like to lock it down much more than the check boxes provided within the gui.
Running version r51506 on linksys ... |
|
![]() |
|
![]() |
|
inetquestion Replies: 9 Views: 221 |
![]() |
Out of curiosity, why is using ipset so much faster than adding rules through iptables? It's orders of magnitude faster. For ~10,000 addresses it took around 200-300 seconds to add them. Now it can ... | |
![]() |
|
![]() |
|
inetquestion Replies: 9 Views: 221 |
![]() |
Adding ipset command in the firewall script first fixed it. Didn't realize iptables did a verification to ensure that existed, but it makes sense now. :)
Thanks for the assistance! |
|
![]() |
|
![]() |
|
inetquestion Replies: 9 Views: 221 |
![]() |
The ipset list is created by an external process which updates every minute with new entries. Think I see what you mean...
A test showed I'm unable to issue the iptables command if the ipset part ... |
|
![]() |
|
![]() |
|
inetquestion Replies: 9 Views: 221 |
![]() |
Currnetly running version: v3.0-r51306
Linksys WRT3200ACM Many IPs were added to an ipset list named BLOCKED. This part is working. The part I'm confused about is why doesn't the rule below wh ... |
|
![]() |
|
![]() |
|
inetquestion Replies: 9 Views: 221 |
![]() |
Saved an entry in Administration>Commands>Firewall
[code] iptables -I FORWARD -m set --match-set BLOCKED src -j logdrop [/code] Verified the entry above was saved to /tmp/.rc_firewal ... |
|
![]() |
|
![]() |
|
inetquestion Replies: 1 Views: 200 |
![]() |
Existing process creates a logdrop entry for offending IPs in iptables. Would like to see how often blocked IPs gets dropped afterward.
Looked in /var/log/messages and see nothing related to dr ... |
|
![]() |
|
![]() |
|
inetquestion Replies: 8 Views: 1141 |
![]() |
Curious if you figured this out. Doing something similar...
If my script is run manually, it makes iptables additions as expected. The script when run via cron is running and is executing the com ... |
|
![]() |
|
![]() |
|
inetquestion Replies: 0 Views: 1483 |
![]() |
Came across an old program (scalp) which scans access logs looking for regex of known security exploits... Thought it would be interesting to integrate this with dd-wrt/iptables to block source of at ... | |
![]() |
|
![]() |
|
inetquestion Replies: 12 Views: 8871 |
![]() |
Curious, did you resolved the issue/question with QOS? I'm getting something similar with SSH accepting authentication and then hanging. Many of the threads on that topics are pointing to QOS re ... |
|
![]() |
|
![]() |
|
inetquestion Replies: 3 Views: 13012 |
![]() |
Wondered why the HOST was in the *config* section... smh | |
![]() |
|
All times are GMT |