Message Area
Casually read the BBS message area using an easy to use interface. Messages are categorized exactly like they are on the BBS. You may post new messages or reply to existing messages!

You are not logged in. Login here for full access privileges.

Previous Message | Next Message | Back to Linux BBSing  <--  <--- Return to Home Page
   Networked Database  Linux BBSing   [81 / 189] RSS
 From   To   Subject   Date/Time 
Message   Janis Kracht    Ignatious   Unwanted connections to port 23.   October 24, 2017
 1:20 PM *  

Hi,

> I've since recently put my board back on port 23... and I now recall why I
> took it off of it. I keep getting all of these connections from hackers, I
> take it. Anyone know of a way to filter these bad connections?

> I've tried Janis' iptables suggestion, but it isn't working.

The first thing I do after a reboot (which happens rarely) is turn off iptables
 since ubuntu starts if right off the bat everytime automatically:

iptables -F
iptables -X

The above two commands do that.  Once I've turned it off, I restart it with my
own parameters in the two lines below:

For my web server which I run on port 8080:

1)sudo iptables -I INPUT -p tcp --dport 8080 -i eth0 -m state --state NEW -m
recent --set [all on one line]

2)sudo iptables -I INPUT -p tcp --dport 8080 -i eth0 -m state --state NEW -m
recent --update --seconds 60 --hitcount 2 -j DROP [all on one line]

I could use the same commands for my telnet server which runs on port 2030, so
to include the telnet port I would change "dport 8080" with dport 2030 in the
lines above.  If you are using port 23, you would change dport to 23 above.

Finally, I issue the command:
  sudo iptables -L
to check that I've got the iptables command that I want:

bbs@filegate:~$ sudo iptables -L
Chain INPUT (policy ACCEPT)
target     prot opt source               destination
DROP       tcp  --  anywhere             anywhere             tcp dpt:http-alt
state NEW recent: UPDATE seconds: 60 hit_count: 2 name: DEFAULT side: source
           tcp  --  anywhere             anywhere             tcp
dpt:http-alt state NEW recent: SET name: DEFAULT side: source

Chain FORWARD (policy DROP)
target     prot opt source               destination

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination

The above two commands keep jokers from killing my servers after two
connections in 60 seconds :)

Hope this helps,
Janis

--- BBBS/Li6 v4.10 Toy-3
 * Origin: Prism bbs (1:261/38)
  Show ANSI Codes | Hide BBCodes | Show Color Codes | Hide Encoding | Hide HTML Tags | Show Routing
Previous Message | Next Message | Back to Linux BBSing  <--  <--- Return to Home Page

VADV-PHP
Execution Time: 0.0788 seconds

If you experience any problems with this website or need help, contact the webmaster.
VADV-PHP Copyright © 2002-2024 Steve Winn, Aspect Technologies. All Rights Reserved.
Virtual Advanced Copyright © 1995-1997 Roland De Graaf.
v2.0.140505

Warning: Unknown: open(c:\Sessions\sess_jgoksqg7bc8qjtiigcppf0jbp1, O_RDWR) failed: No such file or directory (2) in Unknown on line 0 Warning: Unknown: Failed to write session data (files). Please verify that the current setting of session.save_path is correct (c:\Sessions) in Unknown on line 0 PHP Warning: session_start(): open(c:\Sessions\sess_jgoksqg7bc8qjtiigcppf0jbp1, O_RDWR) failed: No such file or directory (2) in D:\wc5\http\public\VADV\include\common.inc.php on line 45 PHP Warning: Unknown: open(c:\Sessions\sess_jgoksqg7bc8qjtiigcppf0jbp1, O_RDWR) failed: No such file or directory (2) in Unknown on line 0 PHP Warning: Unknown: Failed to write session data (files). Please verify that the current setting of session.save_path is correct (c:\Sessions) in Unknown on line 0