DhoTjai
Verified User
Ye, just change the ssh port and you wont get BFD attacks anymore 
Altough they tried to attack ftp here =p, but thats only once a month =)

Altough they tried to attack ftp here =p, but thats only once a month =)
DhoTjai said:Ye, just change the ssh port and you wont get BFD attacks anymore
Altough they tried to attack ftp here =p, but thats only once a month =)
Unable to load iptables module (ipt_state), aborting.
Unable to load iptables module (ipt_multiport), aborting.
ml ipt_state 1
ml ipt_multiport 1
ml xt_state
ml xt_multiport
Remove that line altogether to avoid the warning.#AllowUsers root
felosi said:If you ever have problems with dos or want to easily admin your firewall I think apf is the way to go. More of an opinion thing but Id like to say Im only on pentium 4 3.2ghz, 1 gig ram server with steady traffic and I have Turkey, Brazil, China, and most of Russia banned along with all the dshield updates, reseved ips and private networks, and It never ever raises my load
Arkaos said:When starting APF it advises the following
Code:iptables v1.3.5: invalid TCP port/service `587953' specified
Is this a correct port?
Nick
Webcart said:Few notes for users considering implementing all this:
- It has been a while since we evaluated APF, but it DIDN'T HAVE UNINSTALL option back then. If you are familiar with shell scrpting, you probably will be able to uninstall it manually. However, if you are a newbie - assume you will not be able to *cleanly* remove APF once it is installed (unless they added uninstall feature).
- APF assumes your server has only 1 network card.
- While using APF with BFD, offending IPs were automatically blocked - which is ok. However, there was no command line option allowing to remove IPs from the backlist
It could be done manually but not without an effort.
- BFD can be used without APF. If you don't want to use dynamic blocking for whatever reason, you might still find it usefull for reporting purposes.
- BFD has hooks up that can be used to integrate it with another firewall (kiss or ipfw in FreeBSD for example).
- Root Kit hunter will generate "false positive" warning during sshd_config check if you comment out Root login as described above:
Remove that line altogether to avoid the warning.- Root Kit hunter doesn't seem to maintain separate application advisory databases for different OSes, which might be confusing.
For example, in CentOS you might get [ Old or patched version ] message for packages that can't be further upgraded with yum.
winger said:Hi,
How can I have some countrys banneds?
regards,
winger.
Dark_Wizard said:Clean and simple removal:
/etc/init.d/apf stop
chkconfig --del apf
rm /etc/init.d/apf /etc/cron.d/fw
rm -rf /etc/apf
Webcart said:I wonder whether you took the time to actually test it and make sure that there are no files left? Or may be you've checked the source code?
It's a simple removal indeed. Not so clean, though.
Dark_Wizard said:I have tried it yes and this is what the author has posted on another forum.
How do you uninstall KISS?
chkconfig --del kiss
Thanks, want to do this, I am running centOS 4.3 and DA latest, anything I should know or do, or is this a "out of the box" installKiss Version 2.0 ready to use in CentOS 4
cd /usr/bin/
wget http://www.web4host.net/tools/kiss
chmod 700 kiss
chown root:root
That's it! To get it running anywhere on the command line, you simply type:
kiss start
To stop the firewall, type:
kiss stop
To get status information, type:
kiss status
If you want to block an offenders IP address/subnet, simply edit the BLOCK_LIST variable in the /usr/bin/kiss file. You can separate IP addresses and subnet's with a space. Once you are finished, simply restart KISS by typing:
kiss restart
here you can fine Version 2.1
http://www.geocities.com/steve93138/
Wael
Thanks, want to do this, I am running centOS 4.3 and DA latest, anything I should know or do, or is this a "out of the box" install
vi /root/firewall_reset
# Iptables firewall reset script
*filter
:INPUT ACCEPT [164:15203]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [147:63028]
COMMIT
*mangle
REROUTING ACCEPT [164:15203]
:INPUT ACCEPT [164:15203]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [147:63028]
OSTROUTING ACCEPT [147:63028]
COMMIT
*nat
REROUTING ACCEPT [14:672]
OSTROUTING ACCEPT [9:684]
:OUTPUT ACCEPT [9:684]
COMMIT
crontab -e
0,15,30,45 * * * * /sbin/iptables-restore < /root/firewall_reset
rebooting the system is a bit hardcore, woudn't you agree?
Why not a shell script to fulsh the iptables and reset the default policies to accept?
Something like: