* Denial-of-Service attack on UDP-port 5060 (SIP/VoIP)
@ 2010-11-28 16:02 Secure-SIP-Server
2010-11-28 18:59 ` Pascal Hambourg
0 siblings, 1 reply; 12+ messages in thread
From: Secure-SIP-Server @ 2010-11-28 16:02 UTC (permalink / raw)
To: netfilter
Hi,
I'm suffering on a Denial-of-Service attack on my SIP(VoIP) UDP port 5060,
getting more then 70 REGISTER requests per second since yesterday. All
comming from the Japanese IP 59.146.75.111:5088.
First I wrote into my iptable:
....
/sbin/iptables -P INPUT DROP
/sbin/iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
....
/sbin/iptables -A INPUT -p udp --dport 5060 -s 59.146.75.111 -j REJECT
....
but it didn't work.
1st Question:
Why??
Then I wrote:
....
/sbin/iptables -P INPUT DROP
/sbin/iptables -A INPUT -m state --state ESTABLISHED -j ACCEPT
/sbin/iptables -A INPUT -p udp --dport 5060 -s 59.146.75.111 -j REJECT
/sbin/iptables -A INPUT -m state --state RELATED -j ACCEPT
....
Nothing changed, still receiving this REGISTER requests on my server.
Then I did:
....
/sbin/iptables -P INPUT DROP
/sbin/iptables -A INPUT -p udp --dport 5060 -s 59.146.75.111 -j REJECT
/sbin/iptables -A INPUT -m state --state ESTABLISHED -j ACCEPT
/sbin/iptables -A INPUT -m state --state RELATED -j ACCEPT
....
This worked! All requests from that IP are rejected, all others reach my
server as ever.
/sbin/iptables -L --line-numbers -v -n
shows me an rapidly increasing number of packages and bytes rejected by the
first statement.
Now my 2nd question:
How can this requests (UDP) be from a ESTABLISHED connection??? They passed
the firewall in the first two examples and therefore they must be
ESTABLISHED!?!
3rd question:
Is there a way to tell iptables to lock only a specific IP:PORT for a while
if this IP transmits more then 50 requests per second? If so, how?
Thanks and regards
Detlef Pilzecker
Weitlahnerstrafle 8
D - 83209 Prien am Chiemsee
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: Denial-of-Service attack on UDP-port 5060 (SIP/VoIP)
2010-11-28 16:02 Denial-of-Service attack on UDP-port 5060 (SIP/VoIP) Secure-SIP-Server
@ 2010-11-28 18:59 ` Pascal Hambourg
2010-11-28 21:31 ` Secure-SIP-Server
0 siblings, 1 reply; 12+ messages in thread
From: Pascal Hambourg @ 2010-11-28 18:59 UTC (permalink / raw)
To: netfilter
Hello,
Secure-SIP-Server a écrit :
>
> I'm suffering on a Denial-of-Service attack on my SIP(VoIP) UDP port 5060,
> getting more then 70 REGISTER requests per second since yesterday. All
> comming from the Japanese IP 59.146.75.111:5088.
[...]
> Now my 2nd question:
> How can this requests (UDP) be from a ESTABLISHED connection??? They passed
> the firewall in the first two examples and therefore they must be
> ESTABLISHED!?!
UDP being connectionless by nature, the notion of "UDP connection" is
rather loose. Therefore a continuous flow of packets with the same ports
and addresses can be considered as one sigle connection even if they are
actually unrelated requests.
> 3rd question:
> Is there a way to tell iptables to lock only a specific IP:PORT for a while
> if this IP transmits more then 50 requests per second? If so, how?
Check the "recent" match. Be sure you read carefully the man page about
its default limits.
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: Denial-of-Service attack on UDP-port 5060 (SIP/VoIP)
2010-11-28 18:59 ` Pascal Hambourg
@ 2010-11-28 21:31 ` Secure-SIP-Server
2010-11-29 1:20 ` SISINT BA
` (3 more replies)
0 siblings, 4 replies; 12+ messages in thread
From: Secure-SIP-Server @ 2010-11-28 21:31 UTC (permalink / raw)
To: netfilter
@ Pascal Hambourg
> > I'm suffering on a Denial-of-Service attack on my SIP(VoIP) UDP port
> > 5060,
> > getting more then 70 REGISTER requests per second since yesterday. All
> > comming from the Japanese IP 59.146.75.111:5088.
> [...]
> > How can this requests (UDP) be from a ESTABLISHED connection??? They
> > passed
> > the firewall in the first two examples and therefore they must be
> > ESTABLISHED!?!
>
> UDP being connectionless by nature, the notion of "UDP connection" is
> rather loose. Therefore a continuous flow of packets with the same ports
> and addresses can be considered as one sigle connection even if they are
> actually unrelated requests.
Yes, looks like. I discovered that this only happens if I add the FW-rule
later then the first connection of the attacker to my SIP-server happened.
When I install the rule to DROP this requests behind
iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
I must reboot the server before it works. If I don't want to reboot I must
put the DROP rule before this rule.
> > Is there a way to tell iptables to lock only a specific IP:PORT for a
> > while
> > if this IP transmits more then 50 requests per second? If so, how?
>
> Check the "recent" match. Be sure you read carefully the man page about
> its default limits.
Thanks for this!!! But ...
The author of "recent" writes:
"If the '--update' rule is before this check for ! NEW,INVALID packets then
ESTABLISHED connection or those in the process of becoming ESTABLISHED could
be disrupted by a malicious person who can modify his/her source address."
So in his opinion my
iptables -A INPUT -p udp --dport 5060 -m recent --update --seconds
1 --hitcount 20 -j DROP
must come behind
iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
and this leads me to the problem from above. This ACCEPT rule lets pass all
packages, because the first 19 packets in the first second are accepted and
therefore the FW considers the continuous flow of packets with the same port
and address as a single connection - and let them pass here.
Is there a way to tell the FW that this continuous flow of packets is not to
be considered a ESTABLISHED connection?
----------
@marcos
> i had the same trouble in the past , and beyond the rules for your FW
> on
> itself there is " other consideration" to get on mind , all people that
> are trying to steal Voip deploy you "brute force attack" first trying
> with few packets, then if they were not blocked , the real attacks
> begins
> later . because don't have any sense keep attack to a blocked server,
> thay
> are bad no dummies . so the speed with you blocks these tries are so
> critical and will defines to your intruder how effective is the defense
> that you have.
>
> So will be so helpfull install some script that inspect your logs to
> detect
> the intrusion attack , i have very well result with FAIL2BABN, [...]
Thank you for this idea and your other considerations!!!
Regards
Detlef Pilzecker
Weitlahnerstrafle 8
D - 83209 Prien am Chiemsee
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: Denial-of-Service attack on UDP-port 5060 (SIP/VoIP)
2010-11-28 21:31 ` Secure-SIP-Server
@ 2010-11-29 1:20 ` SISINT BA
2010-11-29 2:50 ` /dev/rob0
` (2 subsequent siblings)
3 siblings, 0 replies; 12+ messages in thread
From: SISINT BA @ 2010-11-29 1:20 UTC (permalink / raw)
To: Secure-SIP-Server, netfilter
dear friends here again :
Sorry about misstyping. the script name well typed is
FAIL2BAN .
it's so easy to configure and use , just a few steps to put it to work.
need to define a rule to detect Fails in the log file ( ie choose what
log inspect asterisk.log o, or syslog, or messages. and so on ) for
looking some reg expressions inside them ( like " wrong password " , .. an
son on ) and to define an action to take when an attack was detected (
ie add iptables rule ) and Voilá!, that is it!!. That's all!!!. you will
find examples there with the script
take a look here
http://www.voip-info.org/wiki/view/Fail2Ban+%28with+iptables%29+And+Asterisk
this may guide quickly to setup on asterisk
This script will work fine with other services too, vsftp, httpd,
SSH, or any user log that you got
you can define how many fails will be assumed like attack and how many time
leave EACH host banned ,
also can send a mail to any address using the mta to NOTIFY EVENTS ,
included start and stop the defense ,
this so helpfull to larm when rebooting,,,,,, power failrudes ,,,,
Believe me , You will find this script so helpfull.
i really hope that this may help you too.
Join together to keep bad people banned!!!! :-)
Think about this :
This schema keep in sight to detetct intruders a neturalize your action
quickly , and no matters to dive into the nature of the networks. because
of for the thieves it's more easy to steal any people that don't have any
"alarm" that fight against guys that were alerted and armed !!! and they
just will leave us alone when they had seen that were dsicovered. .
Good luck, ....and ....... "That the force be with You!" .......or better
....... with "Us"
marcos
----- Original Message -----
From: "Secure-SIP-Server" <info@secure-sip-server.net>
To: <netfilter@vger.kernel.org>
Sent: Sunday, November 28, 2010 6:31 PM
Subject: Re: Denial-of-Service attack on UDP-port 5060 (SIP/VoIP)
> @ Pascal Hambourg
>
> > > I'm suffering on a Denial-of-Service attack on my SIP(VoIP) UDP port
> > > 5060,
> > > getting more then 70 REGISTER requests per second since yesterday. All
> > > comming from the Japanese IP 59.146.75.111:5088.
> > [...]
> > > How can this requests (UDP) be from a ESTABLISHED connection??? They
> > > passed
> > > the firewall in the first two examples and therefore they must be
> > > ESTABLISHED!?!
> >
> > UDP being connectionless by nature, the notion of "UDP connection" is
> > rather loose. Therefore a continuous flow of packets with the same ports
> > and addresses can be considered as one sigle connection even if they are
> > actually unrelated requests.
>
> Yes, looks like. I discovered that this only happens if I add the FW-rule
> later then the first connection of the attacker to my SIP-server happened.
> When I install the rule to DROP this requests behind
> iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
> I must reboot the server before it works. If I don't want to reboot I must
> put the DROP rule before this rule.
>
> > > Is there a way to tell iptables to lock only a specific IP:PORT for a
> > > while
> > > if this IP transmits more then 50 requests per second? If so, how?
> >
> > Check the "recent" match. Be sure you read carefully the man page about
> > its default limits.
>
> Thanks for this!!! But ...
> The author of "recent" writes:
> "If the '--update' rule is before this check for ! NEW,INVALID packets
then
> ESTABLISHED connection or those in the process of becoming ESTABLISHED
could
> be disrupted by a malicious person who can modify his/her source address."
> So in his opinion my
> iptables -A INPUT -p udp --dport 5060 -m recent --update --seconds
> 1 --hitcount 20 -j DROP
> must come behind
> iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
> and this leads me to the problem from above. This ACCEPT rule lets pass
all
> packages, because the first 19 packets in the first second are accepted
and
> therefore the FW considers the continuous flow of packets with the same
port
> and address as a single connection - and let them pass here.
>
> Is there a way to tell the FW that this continuous flow of packets is not
to
> be considered a ESTABLISHED connection?
>
>
> ----------
> @marcos
>
> > i had the same trouble in the past , and beyond the rules for your FW
> > on
> > itself there is " other consideration" to get on mind , all people
that
> > are trying to steal Voip deploy you "brute force attack" first
trying
> > with few packets, then if they were not blocked , the real attacks
> > begins
> > later . because don't have any sense keep attack to a blocked server,
> > thay
> > are bad no dummies . so the speed with you blocks these tries are so
> > critical and will defines to your intruder how effective is the
defense
> > that you have.
> >
> > So will be so helpfull install some script that inspect your logs to
> > detect
> > the intrusion attack , i have very well result with FAIL2BABN, [...]
>
> Thank you for this idea and your other considerations!!!
>
>
> Regards
>
> Detlef Pilzecker
> Weitlahnerstraße 8
> D - 83209 Prien am Chiemsee
>
> --
> To unsubscribe from this list: send the line "unsubscribe netfilter" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
>
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: Denial-of-Service attack on UDP-port 5060 (SIP/VoIP)
2010-11-28 21:31 ` Secure-SIP-Server
2010-11-29 1:20 ` SISINT BA
@ 2010-11-29 2:50 ` /dev/rob0
2010-11-29 13:12 ` SISINT BA
2010-11-29 21:38 ` Secure-SIP-Server
2010-11-30 13:14 ` Using iptables for throttling SMTP traffic Secure-SIP-Server
3 siblings, 1 reply; 12+ messages in thread
From: /dev/rob0 @ 2010-11-29 2:50 UTC (permalink / raw)
To: netfilter
On Sun, Nov 28, 2010 at 10:31:24PM +0100, Secure-SIP-Server wrote:
> @ Pascal Hambourg
>
>> > I'm suffering on a Denial-of-Service attack on my SIP(VoIP) UDP
>> > port 5060, getting more then 70 REGISTER requests per second
>> > since yesterday. All comming from the Japanese IP
>> > 59.146.75.111:5088.
>> [...]
>> > How can this requests (UDP) be from a ESTABLISHED connection???
>> > They passed the firewall in the first two examples and therefore
>> > they must be ESTABLISHED!?!
>>
>> UDP being connectionless by nature, the notion of "UDP connection"
>> is rather loose. Therefore a continuous flow of packets with the
>> same ports and addresses can be considered as one sigle connection
>> even if they are actually unrelated requests.
This is the problem I too am having in trying to block SIP attacks,
which I posted about ever so long ago, back in 2010 November:
http://www.spinics.net/lists/netfilter/msg49598.html
The brute forcing generally seems to come with the same --sport, and
since my Asterisk had replied with SIP rejections to the first few,
it's ESTABLISHED.
Since that post, however, I have seen a few of these being detected
and blocked, which makes me think there might be multiple attack bots
(different code and owners) in the wild.
I think that the -m recent approach is not enough. We might also need
something with -m limit. At this point I don't know enough about SIP
and how it works, but I'm guessing that the SIP dialogue for a
successful call is relatively short, so a --limit of 20 packets or so
might help, preceding any --ctstate ESTABLISHED,RELATED -j ACCEPT
rule, of course.
The bulk of a SIP call would be the RTP, which would be on ports
other than 5060, in --ctstate RELATED (courtesy of the
nf_conntrack_sip module.)
> Yes, looks like. I discovered that this only happens if I add the
> FW-rule later then the first connection of the attacker to my
> SIP-server happened. When I install the rule to DROP this requests
> behind
> iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
> I must reboot the server before it works. If I don't want to reboot
> I must put the DROP rule before this rule.
Reboot is never necessary for this, unless you did something foolish
with your kernel (built-in rather than modules?) See conntrack(8),
and even without conntrack you can simply flush your rules, set all
policies to ACCEPT, and remove the modules.
>> > Is there a way to tell iptables to lock only a specific IP:PORT
>> > for a while if this IP transmits more then 50 requests per
>> > second? If so, how?
>>
>> Check the "recent" match. Be sure you read carefully the man page
>> about its default limits.
>
> Thanks for this!!! But ...
> The author of "recent" writes:
> "If the '--update' rule is before this check for ! NEW,INVALID
> packets then ESTABLISHED connection or those in the process of
> becoming ESTABLISHED could be disrupted by a malicious person who
> can modify his/her source address."
> So in his opinion my
> iptables -A INPUT -p udp --dport 5060 -m recent --update --seconds
> 1 --hitcount 20 -j DROP
> must come behind
> iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
> and this leads me to the problem from above. This ACCEPT rule lets
> pass all packages, because the first 19 packets in the first second
> are accepted and therefore the FW considers the continuous flow of
> packets with the same port and address as a single connection - and
> let them pass here.
>
> Is there a way to tell the FW that this continuous flow of packets
> is not to be considered a ESTABLISHED connection?
We precede the ESTABLISHED --> ACCEPT rule with something to handle
SIP specially. Ugly, but probably the only choice.
> ----------
> @marcos
>
>> i had the same trouble in the past , and beyond the rules for your
>> FW on itself there is " other consideration" to get on mind , all
>> people that are trying to steal Voip deploy you "brute force
>> attack" first trying with few packets, then if they were not
>> blocked , the real attacks begins later . because don't have any
>> sense keep attack to a blocked server, thay are bad no dummies .
This fits with my experience as well, but don't count on it always
being like this. Remember, the vast majority of these attack bots are
operating from stolen resources (compromised systems.) It doesn't
matter to them if they waste those resources, because the bots are
out there continually working to steal more.
That's why abuse reports might still be worth the trouble. If the
REAL owners of the attacking machines are alerted to the problem,
they might take action to fix it. At least in a small portion of
cases, don't get your hopes up.
>> so the speed with you blocks these tries are so critical and will
>> defines to your intruder how effective is the defense that you
>> have.
>>
>> So will be so helpfull install some script that inspect your logs
>> to detect the intrusion attack , i have very well result with
>> FAIL2BABN, [...]
>
> Thank you for this idea and your other considerations!!!
I have complaints with fail2ban. Yes, I know it works, and it's
simple, but it doesn't feel like the right approach to me. Why do we
need another daemon running to scan log files? Logs are for humans.
I'd like to see network services with the ability to trigger external
events when they're under attack.
Failing that, -m recent is pretty effective, but in the case of SIP,
apparently not quite enough. (It works very well for SSH.)
--
Offlist mail to this address is discarded unless
"/dev/rob0" or "not-spam" is in Subject: header
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: Denial-of-Service attack on UDP-port 5060 (SIP/VoIP)
2010-11-29 2:50 ` /dev/rob0
@ 2010-11-29 13:12 ` SISINT BA
0 siblings, 0 replies; 12+ messages in thread
From: SISINT BA @ 2010-11-29 13:12 UTC (permalink / raw)
To: netfilter
I think that any undesired packets must be DROPPED and not REJECTED
becasue in some way REJECT is REPLY WITH ..... and DROP is just
UNREPLIED . less effort for FW , don't consume bandwith and more important
don't give any reponse to source ip!!.
I read the post that you have mention iptables Log , and the info that you
got ON CLI CONSOLE is the same put on the log file for asterisk too , so
both action must be taken , all that you need on FW and all that you can on
Logfiles ,
I agree , with you about bot attacks and resources stolen o server /hosts
hacked,
I have had 300 , or even more, ip address blocked on my list at the
same time , because of them . But like i said , if you block them after a
few packets , the attacks changes the ip source to anotherone , keep trying
but after enough tries they left you to search onother server more easy
to attack. and believeme!!! , there are on the network server more
insecure that ours own , so more easy to be under attack .Except that the
attacks wants to blcok your server by another reason ,,,, ie beacuse very
angry with you :-)...
on the opposite way , when an attack were not blocked quickly, the robot
can keep yours tries for days and beyond that you block them and can't
reach the VoIP service because is being blocked , in this situation you
can't avoid that the UDP voip registers packets arrives to your network
because don't require any connection, because of UDP nature on itself ,
and i promess that thay will be " hugh bunch" Flooding your connection if
dont stop quickly. In eralier times i had robots keep trying to steal over
one week at rates 2 MBits, obviusly blocked can't stole. limit can't stop
the server Voip.... but injury me borrowing bandwith that i need for mi
clients. :-(
coming from CHINA, Korea, URSS, Brazil, USA, Detuchalnd,Australia .. an
some others USA included)
So we could think in restrict the access to a cloud of IP well konwn ,
from where we expect user will be conected. it's so helpfull too. in our
FW, drop any unkown, accept known and jump to onother Chain any packets
on doubt , there we can log, mark, limit, and so forth and at last, if this
progress an reach our server and these tries fails to register then will
be blocked trough our log analisis script ( in my case fail2ban)
Another help that fal2ban provides is that the info for abuse compliant are
mailed to we ( info are taken from ARIN,APNIC.... as correpond to ip soruce
that attacks ) this may be helpfull with some cases . to make the complaint
, may work with some ISP, but is solwwwwww and lonnnng way below i put
copy from mail sent by failt2ban when block an ip
Beyond all these .. NEVER nothig that we are doing will be enough about
take care about security.
all that we can , must be made to assure our server , any combination of
rules, services, configurations, Yeap! it's a very hard work!!!
On other thread i have comment about a simple try to allow access based on
iptbales + ip sorce identified by DDNS domain , i mean
the user that need to access to your server must be identified trough
source ip , ( ideal for fixed ip but not everyone has one ) , over dymamics
ip, the user needs to run a ddns client keeping user source domain
updated, ie over DYNDNS.
client.domain.dyndns.org and your connection to internet trough
input-eth-dev
iptables -I INPUT -i input-eth-dev -s client.domain.dyndns.org -j ACCEPT
iptables -I INPUT -i input-eth-dev -p udp --dport 5060 -j DROP
this has some trouble with DNS caches refresehing when the client ip
changes very often on many cases where the ISP force disconects changing ip
on the users may be so hard and don't be usefull , like on some ADSL
providers , becasue any source change will require that your iptables
modules must be reloaded at least so often like you re-register your
Voip sucscription on asterisk ( beacause in FW rules based on domains will
be resolved to the real ip that had at those moment (or that were cached
too) when the rule was loaded , here big trouble ) . it's a trouble may
be handled with cron , but it's a trouble in any way.
I hope that can help anynone
Thank you all .
like said before here is the Copy of mail from fal2ban notifyingme about
ip that was blcked
VERY IMPORTANT
PLEASE NOTE THAT HE INFO IS ABOUT THE ISP PROVIDER THAT HAVE THE SOURCE
IP UNDER YOUR ADMINSITRATION , NOT THE IDENTITY OF PEOPLE THAT MADE THE
ATTACK
BUT HAS THE MAIL ADDRESS WHERE SEND THE DISCLAIM/COMPLAINT FOR ABUSE
###############################################################
Hi,
The IP 60.171.75.147 has just been banned by Fail2Ban after
237 attempts against ASTERISK-METRO1.
Here are more information about 60.171.75.147:
[Preguntando whois.apnic.net]
[whois.apnic.net]
% [whois.apnic.net node-2]
% Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
inetnum: 60.166.0.0 - 60.175.255.255
netname: CHINANET-AH
descr: CHINANET anhui province network
descr: China Telecom
descr: A12,Xin-Jie-Kou-Wai Street
descr: Beijing 100088
country: CN
admin-c: CH93-AP
tech-c: JW89-AP
mnt-by: APNIC-HM
mnt-routes: MAINT-CHINANET-AH
mnt-lower: MAINT-CHINANET-AH
status: ALLOCATED PORTABLE
changed: hm-changed@apnic.net 20040721
source: APNIC
person: Chinanet Hostmaster
nic-hdl: CH93-AP
e-mail: anti-spam@ns.chinanet.cn.net
address: No.31 ,jingrong street,beijing
address: 100032
phone: +86-10-58501724
fax-no: +86-10-58501724
country: CN
changed: dingsy@cndata.com 20070416
mnt-by: MAINT-CHINANET
source: APNIC
person: Jinneng Wang
address: 17/F, Postal Building No.120 Changjiang
address: Middle Road, Hefei, Anhui, China
country: CN
phone: +86-551-2659073
fax-no: +86-551-2659287
e-mail: wang@mail.hf.ah.cninfo.net
nic-hdl: JW89-AP
mnt-by: MAINT-NEW
changed: wang@mail.hf.ah.cninfo.net 19990818
source: APNIC
Regards,
Fail2Ban
----- Original Message -----
From: "/dev/rob0" <rob0@gmx.co.uk>
To: <netfilter@vger.kernel.org>
Sent: Sunday, November 28, 2010 11:50 PM
Subject: Re: Denial-of-Service attack on UDP-port 5060 (SIP/VoIP)
> On Sun, Nov 28, 2010 at 10:31:24PM +0100, Secure-SIP-Server wrote:
> > @ Pascal Hambourg
> >
> >> > I'm suffering on a Denial-of-Service attack on my SIP(VoIP) UDP
> >> > port 5060, getting more then 70 REGISTER requests per second
> >> > since yesterday. All comming from the Japanese IP
> >> > 59.146.75.111:5088.
> >> [...]
> >> > How can this requests (UDP) be from a ESTABLISHED connection???
> >> > They passed the firewall in the first two examples and therefore
> >> > they must be ESTABLISHED!?!
> >>
> >> UDP being connectionless by nature, the notion of "UDP connection"
> >> is rather loose. Therefore a continuous flow of packets with the
> >> same ports and addresses can be considered as one sigle connection
> >> even if they are actually unrelated requests.
>
> This is the problem I too am having in trying to block SIP attacks,
> which I posted about ever so long ago, back in 2010 November:
>
> http://www.spinics.net/lists/netfilter/msg49598.html
>
> The brute forcing generally seems to come with the same --sport, and
> since my Asterisk had replied with SIP rejections to the first few,
> it's ESTABLISHED.
>
> Since that post, however, I have seen a few of these being detected
> and blocked, which makes me think there might be multiple attack bots
> (different code and owners) in the wild.
>
> I think that the -m recent approach is not enough. We might also need
> something with -m limit. At this point I don't know enough about SIP
> and how it works, but I'm guessing that the SIP dialogue for a
> successful call is relatively short, so a --limit of 20 packets or so
> might help, preceding any --ctstate ESTABLISHED,RELATED -j ACCEPT
> rule, of course.
>
> The bulk of a SIP call would be the RTP, which would be on ports
> other than 5060, in --ctstate RELATED (courtesy of the
> nf_conntrack_sip module.)
>
> > Yes, looks like. I discovered that this only happens if I add the
> > FW-rule later then the first connection of the attacker to my
> > SIP-server happened. When I install the rule to DROP this requests
> > behind
> > iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
> > I must reboot the server before it works. If I don't want to reboot
> > I must put the DROP rule before this rule.
>
> Reboot is never necessary for this, unless you did something foolish
> with your kernel (built-in rather than modules?) See conntrack(8),
> and even without conntrack you can simply flush your rules, set all
> policies to ACCEPT, and remove the modules.
>
> >> > Is there a way to tell iptables to lock only a specific IP:PORT
> >> > for a while if this IP transmits more then 50 requests per
> >> > second? If so, how?
> >>
> >> Check the "recent" match. Be sure you read carefully the man page
> >> about its default limits.
> >
> > Thanks for this!!! But ...
> > The author of "recent" writes:
> > "If the '--update' rule is before this check for ! NEW,INVALID
> > packets then ESTABLISHED connection or those in the process of
> > becoming ESTABLISHED could be disrupted by a malicious person who
> > can modify his/her source address."
> > So in his opinion my
> > iptables -A INPUT -p udp --dport 5060 -m recent --update --seconds
> > 1 --hitcount 20 -j DROP
> > must come behind
> > iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
> > and this leads me to the problem from above. This ACCEPT rule lets
> > pass all packages, because the first 19 packets in the first second
> > are accepted and therefore the FW considers the continuous flow of
> > packets with the same port and address as a single connection - and
> > let them pass here.
> >
> > Is there a way to tell the FW that this continuous flow of packets
> > is not to be considered a ESTABLISHED connection?
>
> We precede the ESTABLISHED --> ACCEPT rule with something to handle
> SIP specially. Ugly, but probably the only choice.
>
> > ----------
> > @marcos
> >
> >> i had the same trouble in the past , and beyond the rules for your
> >> FW on itself there is " other consideration" to get on mind , all
> >> people that are trying to steal Voip deploy you "brute force
> >> attack" first trying with few packets, then if they were not
> >> blocked , the real attacks begins later . because don't have any
> >> sense keep attack to a blocked server, thay are bad no dummies .
>
> This fits with my experience as well, but don't count on it always
> being like this. Remember, the vast majority of these attack bots are
> operating from stolen resources (compromised systems.) It doesn't
> matter to them if they waste those resources, because the bots are
> out there continually working to steal more.
>
> That's why abuse reports might still be worth the trouble. If the
> REAL owners of the attacking machines are alerted to the problem,
> they might take action to fix it. At least in a small portion of
> cases, don't get your hopes up.
>
> >> so the speed with you blocks these tries are so critical and will
> >> defines to your intruder how effective is the defense that you
> >> have.
> >>
> >> So will be so helpfull install some script that inspect your logs
> >> to detect the intrusion attack , i have very well result with
> >> FAIL2BABN, [...]
> >
> > Thank you for this idea and your other considerations!!!
>
> I have complaints with fail2ban. Yes, I know it works, and it's
> simple, but it doesn't feel like the right approach to me. Why do we
> need another daemon running to scan log files? Logs are for humans.
> I'd like to see network services with the ability to trigger external
> events when they're under attack.
>
> Failing that, -m recent is pretty effective, but in the case of SIP,
> apparently not quite enough. (It works very well for SSH.)
> --
> Offlist mail to this address is discarded unless
> "/dev/rob0" or "not-spam" is in Subject: header
> --
> To unsubscribe from this list: send the line "unsubscribe netfilter" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
>
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: Denial-of-Service attack on UDP-port 5060 (SIP/VoIP)
2010-11-28 21:31 ` Secure-SIP-Server
2010-11-29 1:20 ` SISINT BA
2010-11-29 2:50 ` /dev/rob0
@ 2010-11-29 21:38 ` Secure-SIP-Server
2010-12-01 15:48 ` /dev/rob0
2010-11-30 13:14 ` Using iptables for throttling SMTP traffic Secure-SIP-Server
3 siblings, 1 reply; 12+ messages in thread
From: Secure-SIP-Server @ 2010-11-29 21:38 UTC (permalink / raw)
To: netfilter
Thanks to all your thoughts!
I found a solution on how to tell iptables not to see the continuous flow of
SIP-packets as an ESTABLISHED connection. I split
iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
into
# iptables -A INPUT -p ! udp -m state --state ESTABLISHED -j ACCEPT
# iptables -A INPUT -m state --state RELATED -j ACCEPT
The ESTABLISHED rule has not to work for UDP, so I excluded it.
I don't know why iptables does not exclude it by default! Someone knows???
Now I can put below:
# iptables -A INPUT -p udp --dport 5060 -m recent --name
DENIAL_OF_SERVICE --update --seconds 1 --hitcount 20 -j REJECT --reject-with
icmp-admin-prohibited
# iptables -A INPUT -p udp --dport 5060 -m recent --name
DENIAL_OF_SERVICE --set -j ACCEPT
This works for me!!! < I'm happy!!! :-)) >
Now the malicious UDP-packet stream
- always pass the ESTABLISHED rule
- first pass the upper DENIAL_OF_SERVICE rule
- and some packets are accepted by the second DENIAL_OF_SERVICE rule (about
4 or 5 REGISTER requests)
- but then the first DENIAL_OF_SERVICE rule rejects all following spam from
this IP (requests from other IPs are still accepted!), and it is doing this
now since hours rejecting several hundred MB traffic received. All others
with normal traffic can pass to my SIP-Server without problems!
@ marcos: Of course I could also drop the packets instead of rejecting
them, but I prefer this for the moment with: icmp-admin-prohibited.
----
I also noticed weeks before this attack happened that someone sends me
SIP-REGISTER requests, always with the same
User-Agent: friendly-scanner
and I didn't know why. I suppose it was the one that started the attack now,
but I don't know because I don't remember the IPs of those first requests.
In the following links I found some interesting thoughts about this attacks
and a program to do those too!
blog of SIP-vicious
http://blog.sipvicious.org/
FAQ to SIP-vicious:
http://code.google.com/p/sipvicious/wiki/FrequentlyAskedQuestions
Storming SIP Security (pdf-discussion on the problem):
http://resources.enablesecurity.com/resources/22_29_storming_sip.pdf
Programs like FAIL2BAN are a good idea to use in addition to the above
iptables rules, but fortunately I'm one of two coders writing scripts for a
SIP-server in Perl (Net::SIP available at CPAN). I think I will write a
module to check the incoming SIP messages for recurring possibly malicious
intentions, that module should drop identified attacks not rejected before
by the firewall. I will think about the best way to do this.
Regards
Detlef Pilzecker
Weitlahnerstrafle 8
D - 83209 Prien am Chiemsee
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: Using iptables for throttling SMTP traffic
2010-11-28 21:31 ` Secure-SIP-Server
` (2 preceding siblings ...)
2010-11-29 21:38 ` Secure-SIP-Server
@ 2010-11-30 13:14 ` Secure-SIP-Server
2010-11-30 13:24 ` Jan Engelhardt
2010-11-30 14:01 ` lst_hoe02
3 siblings, 2 replies; 12+ messages in thread
From: Secure-SIP-Server @ 2010-11-30 13:14 UTC (permalink / raw)
To: netfilter
Hi Alex!
> I've set up a few basic rules to throttle SMTP traffic from an
> individual host should they make more than 10 connections in ten
> seconds:
>
> iptables -I INPUT -p tcp --dport 25 -i eth0 -m state --state NEW -m
> recent --set
> iptables -I INPUT -p tcp --dport 25 -i eth0 -m state --state NEW -m
> recent --update --seconds 10 --hitcount 10 -j LOG
> iptables -I INPUT -p tcp --dport 25 -i eth0 -m state --state NEW -m
> recent --update --seconds 10 --hitcount 10 -j DROP
>
> Is this the correct way to do this? I notice the seconds value can't
> be any greater than 20. What is the reason for this? I'd like to do
> something like permit up to 100 messages/connections over any
> 60-second period. Is this possible?
It is possible, but if your kernel supports it I don't know.
You can do:
# rmmod ipt_recent
# modprobe ipt_recent ip_pkt_list_tot=100
If you get the info that ipt_recent can't be removed because it's in use you
must remove all 'recent' rules in your firewall table first. Then try it
again.
But be careful !!!!!!!
I had set the values to hight. First everything worked fine. No error
message when I did
# iptables -A INPUT -p udp --dport 5060 -m recent --name
DENIAL_OF_SERVICE --update --rttl --seconds 1 --hitcount 10 -j DROP
# iptables -A INPUT -p udp --dport 5060 -m recent --name
DENIAL_OF_SERVICE --update --rttl --seconds 100 --hitcount 200 -j DROP
# iptables -A INPUT -p udp --dport 5060 -m recent --name
DENIAL_OF_SERVICE --set -j ACCEPT
and
# /sbin/iptables -L --line-numbers -v -n
also showed that this was installed.
Then I rebooted the server and ... nothing. I wasn't able to get in contact
with my server again!!!!!!!!!
I had to access the Hard-disk booting from other system to fix it back to
the default values. Then it worked again, but only with the default max
of --hitcount 20 :-(
Regards
Detlef Pilzecker
Weitlahnerstrafle 8
D - 83209 Prien am Chiemsee
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: Using iptables for throttling SMTP traffic
2010-11-30 13:14 ` Using iptables for throttling SMTP traffic Secure-SIP-Server
@ 2010-11-30 13:24 ` Jan Engelhardt
2010-11-30 14:01 ` lst_hoe02
1 sibling, 0 replies; 12+ messages in thread
From: Jan Engelhardt @ 2010-11-30 13:24 UTC (permalink / raw)
To: Secure-SIP-Server; +Cc: netfilter
On Tuesday 2010-11-30 14:14, Secure-SIP-Server wrote:
> It is possible, but if your kernel supports it I don't know.
>
> You can do:
> # rmmod ipt_recent
> # modprobe ipt_recent ip_pkt_list_tot=100
It's called xt_recent.
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: Using iptables for throttling SMTP traffic
2010-11-30 13:14 ` Using iptables for throttling SMTP traffic Secure-SIP-Server
2010-11-30 13:24 ` Jan Engelhardt
@ 2010-11-30 14:01 ` lst_hoe02
1 sibling, 0 replies; 12+ messages in thread
From: lst_hoe02 @ 2010-11-30 14:01 UTC (permalink / raw)
To: netfilter
Zitat von Secure-SIP-Server <info@secure-sip-server.net>:
> Hi Alex!
>
>> I've set up a few basic rules to throttle SMTP traffic from an
>> individual host should they make more than 10 connections in ten
>> seconds:
>>
>> iptables -I INPUT -p tcp --dport 25 -i eth0 -m state --state NEW -m
>> recent --set
>> iptables -I INPUT -p tcp --dport 25 -i eth0 -m state --state NEW -m
>> recent --update --seconds 10 --hitcount 10 -j LOG
>> iptables -I INPUT -p tcp --dport 25 -i eth0 -m state --state NEW -m
>> recent --update --seconds 10 --hitcount 10 -j DROP
>>
>> Is this the correct way to do this? I notice the seconds value can't
>> be any greater than 20. What is the reason for this? I'd like to do
>> something like permit up to 100 messages/connections over any
>> 60-second period. Is this possible?
You can't at TCP/IP level. Modern Mailserver are able to push a lot of
messages in *one* TCP/IP session (ESMTP). You can handle the max.
number of new connections/time (recent) and the max. number of
parallel connections at a given time (connlimit), but not the number
of messages with iptables or any other TCP/IP based filter.
Regards
Andreas
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: Denial-of-Service attack on UDP-port 5060 (SIP/VoIP)
2010-11-29 21:38 ` Secure-SIP-Server
@ 2010-12-01 15:48 ` /dev/rob0
2010-12-01 18:31 ` Secure-SIP-Server
0 siblings, 1 reply; 12+ messages in thread
From: /dev/rob0 @ 2010-12-01 15:48 UTC (permalink / raw)
To: netfilter
On Mon, Nov 29, 2010 at 10:38:32PM +0100, Secure-SIP-Server wrote:
> Thanks to all your thoughts!
Unfortunately due to power problems I have had daily shutdowns
resulting in IP address changes, so my Asterisk console is staying
quiet until the searchbots find me. I'm hoping for a week or two on
the same IP, so I can accumulate some results.
At this point I will just share my ruleset, in relevant part:
*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:AllowHosts - [0:0]
:BadGuy - [0:0]
:Brake - [0:0]
:DropHosts - [0:0]
:Rejects - [0:0]
:State - [0:0]
:WAN - [0:0]
-A INPUT -j DropHosts
-A INPUT -j State
-A INPUT -j AllowHosts
# This chain allows known external hosts and my own networks
-A AllowHosts -i lo -j ACCEPT
-A AllowHosts -i eth0 -j ACCEPT
-A AllowHosts -i tun+ -j ACCEPT
-A AllowHosts -i wlan+ -j ACCEPT
-A AllowHosts -s x.y.z.48/29 -j ACCEPT
-A AllowHosts -s p.q.r.72/29 -j ACCEPT
# following is a SIP origination provider
-A AllowHosts -s 66.54.140.0/23 -m comment --comment "ipkall" -j ACCEPT
# following are SIP termination providers
-A AllowHosts -s 204.8.45.222 -m comment --comment "tfg" -j ACCEPT
-A AllowHosts -s 64.2.142.0/24 -m comment --comment "vitelity" -j ACCEPT
# and for anything which remains, from the Internet interface:
-A AllowHosts -i eth1 -j WAN
# Packets come here when we have determined that they are an attack
-A BadGuy -p tcp --dport 22 -j LOG --log-prefix "SSH attacker: "
-A BadGuy -p udp --dport 5060 -j LOG --log-prefix "SIP attacker: "
-A BadGuy -m recent --set --name BADGUY -j DROP
# Brake means "slow down" a possible attack. We allow 3 in 0:30 for
# SSH attempts, 9 in 0:30 for SIP, then reject the next few up to 6
# in 0:45 for SSH and 18 in 0:45 for SIP. A host who has exceeded
# those limits is deemed an attacker (-j BadGuy).
-A Brake -p tcp -m recent --rcheck --hitcount 6 --name BRAKE --seconds 45 -j BadGuy -m comment --comment "SSH attacker"
-A Brake -p udp -m recent --rcheck --hitcount 18 --name BRAKE --seconds 45 -j BadGuy -m comment --comment "SIP attacker"
-A Brake -p tcp -m recent --update --hitcount 3 --name BRAKE --seconds 30 -j REJECT --reject-with tcp-reset -m comment --comment "probable SSH attack"
-A Brake -p udp -m recent --update --hitcount 9 --name BRAKE --seconds 30 -j REJECT --reject-with icmp-port-unreachable -m comment --comment "probable SIP attack"
-A Brake -m recent --set --name BRAKE -j ACCEPT -m comment --comment "adds source IP to BRAKE list"
# This chain comes first, and drops known attackers
-A DropHosts -m recent --rcheck --name BADGUY -j DROP -m comment --comment "checks to see if source IP has attacked us"
-A DropHosts -m mac --mac-source 00:0F:9F:6F:14:F0 -m comment --comment "example DropHosts rule" -j DROP
-A Rejects -i eth0 -m comment --comment "from LAN"
-A Rejects -i wlan+ -m comment --comment "from Wifi"
-A Rejects -i eth1 -m comment --comment "from WAN"
-A Rejects -i tun+ -m comment --comment "from VPN"
-A Rejects -p tcp -j REJECT --reject-with tcp-reset
-A Rejects -m comment --comment "This takes the place of a default DROP policy" -j DROP
-A Rejects -m comment --comment "This should always be [0:0]" -j DROP
# The second chain, has the SIP bypass
-A State -m conntrack --ctstate INVALID -j DROP
-A State -m conntrack --ctstate RELATED -j ACCEPT
-A State -i eth1 -p udp --dport 5060 -j AllowHosts -m comment --comment "later goes to WAN"
-A State -m conntrack --ctstate ESTABLISHED -j ACCEPT
# Packets coming in the external interface come here
-A WAN -p tcp --dport 22 -j Brake
-A WAN -p udp --dport 1194 -j ACCEPT -m comment --comment "openvpn"
-A WAN -m conntrack --ctstate NEW -p udp --dport 5060 -j LOG --log-prefix "NEW SIP: "
-A WAN -p udp --dport 5060 -j Brake
-A WAN -p icmp -m icmp --icmp-type 0 -m limit --limit 5/min --limit-burst 3 -j ACCEPT
-A WAN -p icmp -m icmp --icmp-type 0 -j DROP
-A WAN -p icmp -j ACCEPT
-A WAN -i eth1 -m comment --comment "from WAN" -j Rejects
> I found a solution on how to tell iptables not to see the
> continuous flow of SIP-packets as an ESTABLISHED connection. I
> split
> iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
> into
> # iptables -A INPUT -p ! udp -m state --state ESTABLISHED -j ACCEPT
This is wrong. You probably want UDP ESTABLISHED packets, in general,
my ruleset above only separates out SIP.
> # iptables -A INPUT -m state --state RELATED -j ACCEPT
> The ESTABLISHED rule has not to work for UDP, so I excluded it. I
> don't know why iptables does not exclude it by default! Someone
> knows???
This is wrong too. ESTABLISHED is fine for UDP; our problem here
being that the attack bots use the same --source-port for the whole
attack, and that by having sent our SIP reply to the initial few
registration attempts, connection tracking considers these to be in
ESTABLISHED state.
> Now I can put below:
> # iptables -A INPUT -p udp --dport 5060 -m recent --name
> DENIAL_OF_SERVICE --update --seconds 1 --hitcount 20 -j REJECT
> --reject-with icmp-admin-prohibited
> # iptables -A INPUT -p udp --dport 5060 -m recent --name
> DENIAL_OF_SERVICE --set -j ACCEPT
>
> This works for me!!! < I'm happy!!! :-)) >
We're trying with different numbers. After I've accumulated some
results with my numbers, I might try shorter --seconds values.
> Now the malicious UDP-packet stream
> - always pass the ESTABLISHED rule
> - first pass the upper DENIAL_OF_SERVICE rule
> - and some packets are accepted by the second DENIAL_OF_SERVICE rule
> (about 4 or 5 REGISTER requests)
> - but then the first DENIAL_OF_SERVICE rule rejects all following
> spam from this IP (requests from other IPs are still accepted!),
> and it is doing this now since hours rejecting several hundred MB
> traffic received.
You might find that the same host will continue to bombard you
indefinitely. I think there is a bug in the malware. :)
> All others with normal traffic can pass to my SIP-Server without
> problems! @ marcos: Of course I could also drop the packets instead
> of rejecting them, but I prefer this for the moment with:
> icmp-admin-prohibited.
I think you should DROP known attackers. When I was under that attack
from mid-November, the ICMP would have significantly hurt my limited
upstream bandwidth (cheap rural consumer-grade DSL here.)
If I ever convert to business-class DSL here, which I might, I'd
demand service from the ISP when my static IP is under such attack.
I'd insist to have it blocked upstream.
--
Offlist mail to this address is discarded unless
"/dev/rob0" or "not-spam" is in Subject: header
^ permalink raw reply [flat|nested] 12+ messages in thread
* Re: Denial-of-Service attack on UDP-port 5060 (SIP/VoIP)
2010-12-01 15:48 ` /dev/rob0
@ 2010-12-01 18:31 ` Secure-SIP-Server
0 siblings, 0 replies; 12+ messages in thread
From: Secure-SIP-Server @ 2010-12-01 18:31 UTC (permalink / raw)
To: netfilter
@ /dev/rob0
> > I found a solution on how to tell iptables not to see the
> > continuous flow of SIP-packets as an ESTABLISHED connection. I
> > split
> > iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
> > into
> > # iptables -A INPUT -p ! udp -m state --state ESTABLISHED -j ACCEPT
>
> This is wrong. You probably want UDP ESTABLISHED packets ....
Hmmm, it might not be the optimum but it works very well. All ESTABLISHED
UDP "connections" can go down the ruleset until they are ACCEPTed or DROPed
by other rule.
> We're trying with different numbers. After I've accumulated some
> results with my numbers, I might try shorter --seconds values.
I think this depends on your non-DoS traffic. My attacker is sending up to
70 packets per second. So
--seconds 10 --hitcount 20
is enough for me at the moment and the othe traffic can pass without
problems.
> I think you should DROP known attackers. When I was under that attack
> from mid-November, the ICMP would have significantly hurt my limited
> upstream bandwidth (cheap rural consumer-grade DSL here.)
You are right and I did it already, but for other consideration:
If the attacker is doing IP-spoofing my REJECT packets will be send to an
innocent IP. That is not what I want, because then unintentionally I become
an attacker on this server with my reject-packets.
If you want to see my ruleset, I attached it below.
In particular I would like to make aware of:
-A OUTPUT -s ! XXX.XXX.XXX.XXX/32 -j DROP
Add to prevent other users of the server from doing IP-spoofing.
I think every server admin should add this by default!
Detlef Pilzecker
Weitlahnerstrafle 8
D - 83209 Prien am Chiemsee
---------------------------------------
# Generated by iptables-save v1.4.2 on Wed Dec 1 18:31:18 2010
*filter
:INPUT DROP [0:0]
:FORWARD DROP [0:0]
:OUTPUT ACCEPT [0:0]
-A INPUT -p ! udp -m state --state ESTABLISHED -j ACCEPT
-A INPUT -m state --state RELATED -j ACCEPT
-A INPUT -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -j
REJECT --reject-with tcp-reset
-A INPUT -m state --state INVALID -j DROP
-A INPUT -i lo -j ACCEPT
-A INPUT -p udp -m udp --dport 5060 -m recent --update --seconds
10 --hitcount 20 --rttl --name DOS_5060 --rsource -j DROP
-A INPUT -p udp -m udp --dport 5060 -m recent --set --name
DOS_5060 --rsource -j ACCEPT
-A INPUT -p tcp -m tcp --dport 80 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 443 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 21 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 22 -m recent --update --seconds
300 --hitcount 5 --rttl --name DOS_22 --rsource -j DROP
-A INPUT -p tcp -m tcp --dport 22 -m recent --set --name DOS_22 --rsource -j
ACCEPT
-A INPUT -p tcp -m tcp --dport 22 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 25 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 110 -j ACCEPT
-A INPUT -p icmp -m icmp --icmp-type 8/0 -j ACCEPT
-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -j
REJECT --reject-with tcp-reset
-A FORWARD -m state --state INVALID -j DROP
-A FORWARD -i lo -o lo -j ACCEPT
-A OUTPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A OUTPUT -p tcp -m tcp ! --tcp-flags FIN,SYN,RST,ACK SYN -j
REJECT --reject-with tcp-reset
-A OUTPUT -m state --state INVALID -j DROP
-A OUTPUT -o lo -j ACCEPT
-A OUTPUT -s ! XXX.XXX.XXX.XXX/32 -j DROP
COMMIT
# Completed on Wed Dec 1 18:31:18 2010
# Generated by iptables-save v1.4.2 on Wed Dec 1 18:31:18 2010
*mangle
:PREROUTING ACCEPT [0:0]
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
COMMIT
# Completed on Wed Dec 1 18:31:18 2010
# Generated by iptables-save v1.4.2 on Wed Dec 1 18:31:18 2010
*nat
:PREROUTING ACCEPT [0:0]
:POSTROUTING ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
COMMIT
# Completed on Wed Dec 1 18:31:18 2010
^ permalink raw reply [flat|nested] 12+ messages in thread
end of thread, other threads:[~2010-12-01 18:31 UTC | newest]
Thread overview: 12+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-11-28 16:02 Denial-of-Service attack on UDP-port 5060 (SIP/VoIP) Secure-SIP-Server
2010-11-28 18:59 ` Pascal Hambourg
2010-11-28 21:31 ` Secure-SIP-Server
2010-11-29 1:20 ` SISINT BA
2010-11-29 2:50 ` /dev/rob0
2010-11-29 13:12 ` SISINT BA
2010-11-29 21:38 ` Secure-SIP-Server
2010-12-01 15:48 ` /dev/rob0
2010-12-01 18:31 ` Secure-SIP-Server
2010-11-30 13:14 ` Using iptables for throttling SMTP traffic Secure-SIP-Server
2010-11-30 13:24 ` Jan Engelhardt
2010-11-30 14:01 ` lst_hoe02
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.