Soluciуn al cookieattack de SAMP: minconnectiontime 500 iptables -A INPUT -p udp --dport 7777 -m length --length 39 -m recent --set -j ACCEPT iptables -A INPUT -p udp --dport 7777 -m length --length 43 -m recent --set -j ACCEPT iptables -A INPUT -p udp --dport 7777 -m recent --rcheck -j ACCEPT iptables -A OUTPUT -p udp --sport 7777 -j ACCEPT |
[14:46:51] [connection] 83.237.35.89:24756 requests connection cookie. [14:46:51] [connection] 85.21.238.182:22966 requests connection cookie. [14:46:51] [connection] 95.220.107.191:22384 requests connection cookie. [14:46:51] [connection] 188.168.72.109:43924 requests connection cookie. [14:46:51] [connection] 109.195.220.144:51365 requests connection cookie. [14:46:51] [connection] 77.50.130.18:50399 requests connection cookie. [14:46:51] [connection] 157.186.44.65:30775 requests connection cookie. [14:46:51] [connection] 77.82.244.222:31119 requests connection cookie. [14:46:51] [connection] 145.249.114.59:44912 requests connection cookie. [14:46:51] [connection] 176.59.72.7:38308 requests connection cookie. [14:46:51] [connection] 89.113.28.222:32124 requests connection cookie. [14:46:51] [connection] 188.18.203.116:33295 requests connection cookie. [14:46:51] [connection] 5.3.136.111:55920 requests connection cookie. [14:46:51] [connection] 62.33.89.186:23717 requests connection cookie. [14:46:51] [connection] 95.37.168.245:56207 requests connection cookie. [14:46:51] [connection] 194.87.251.252:41957 requests connection cookie. [14:46:51] [connection] 95.29.98.106:23383 requests connection cookie. [14:46:51] [connection] 81.176.17.196:31542 requests connection cookie. [14:46:51] [connection] 212.220.255.168:37325 requests connection cookie. [14:46:51] [connection] 85.143.86.98:40105 requests connection cookie. [14:46:51] [connection] 82.179.98.206:54716 requests connection cookie. [14:46:51] [connection] 176.59.99.109:23811 requests connection cookie. [14:46:51] [connection] 128.68.176.20:28551 requests connection cookie. [14:46:51] [connection] 158.46.142.249:33982 requests connection cookie. [14:46:51] [connection] 37.22.180.218:59013 requests connection cookie. [14:46:51] [connection] 128.74.2.13:33621 requests connection cookie. [14:46:51] [connection] 5.227.126.91:37451 requests connection cookie. [14:46:51] [connection] 79.164.12.96:22650 requests connection cookie. [14:46:51] [connection] 46.0.149.93:47443 requests connection cookie. [14:46:51] [connection] 109.244.178.122:45591 requests connection cookie. [14:46:51] [connection] 178.184.58.115:43788 requests connection cookie. [14:46:51] [connection] 193.232.252.204:40023 requests connection cookie. [14:46:51] [connection] 78.37.22.24:57010 requests connection cookie. [14:46:51] [connection] 158.250.46.131:48021 requests connection cookie. [14:46:51] [connection] 178.130.150.161:48559 requests connection cookie. [14:46:51] [connection] 46.72.174.226:21372 requests connection cookie. [14:46:51] [connection] 178.46.101.124:20195 requests connection cookie. [14:46:51] [connection] 83.234.116.181:29763 requests connection cookie. [14:46:51] [connection] 95.32.227.101:35878 requests connection cookie. [14:46:51] [connection] 95.73.71.137:58913 requests connection cookie. [14:46:51] [connection] 159.93.215.65:30178 requests connection cookie. [14:46:51] [connection] 157.186.78.25:28049 requests connection cookie. [14:46:51] [connection] 95.52.171.194:40417 requests connection cookie. [14:46:51] [connection] 176.59.8.121:23163 requests connection cookie. [14:46:51] [connection] 193.232.109.204:29146 requests connection cookie. [14:46:51] [connection] 176.50.222.101:32377 requests connection cookie. [14:46:51] [connection] 109.191.234.65:21620 requests connection cookie. [14:46:51] [connection] 62.118.58.252:46457 requests connection cookie. [14:46:51] [connection] 93.81.218.74:44457 requests connection cookie. [14:46:51] [connection] 79.104.226.128:43301 requests connection cookie. [14:46:51] [connection] 90.189.203.222:22022 requests connection cookie. [14:46:51] [connection] 195.201.116.168:27571 requests connection cookie. [14:46:51] [connection] 46.147.243.202:24830 requests connection cookie. [14:46:51] [connection] 85.173.68.77:25516 requests connection cookie. [14:46:51] [connection] 217.106.240.102:25805 requests connection cookie. [14:46:51] [connection] 37.112.188.199:56196 requests connection cookie. [14:46:51] [connection] 95.37.76.159:36305 requests connection cookie. [14:46:51] [connection] 31.163.142.100:52643 requests connection cookie. [14:46:51] [connection] 79.111.175.152:47680 requests connection cookie. [14:46:51] [connection] 178.141.48.73:37794 requests connection cookie. [14:46:51] [connection] 188.43.178.13:22408 requests connection cookie. [14:46:51] [connection] 178.187.105.171:48462 requests connection cookie. [14:46:51] [connection] 31.23.138.167:47224 requests connection cookie. [14:46:51] [connection] 195.9.68.6:51591 requests connection cookie. [14:46:51] [connection] 188.243.166.237:32342 requests connection cookie. [14:46:51] [connection] 176.15.127.48:59153 requests connection cookie. [14:46:51] [connection] 46.3.208.250:29117 requests connection cookie. [14:46:51] [connection] 195.151.16.0:27259 requests connection cookie. [14:46:51] [connection] 78.85.171.161:55343 requests connection cookie. [14:46:51] [connection] 178.46.164.202:55502 requests connection cookie. [14:46:51] [connection] 195.201.26.4:26691 requests connection cookie. [14:46:51] [connection] 94.19.60.0:49948 requests connection cookie. [14:46:51] [connection] 188.35.144.136:56522 requests connection cookie. [14:46:51] [connection] 193.232.252.29:40761 requests connection cookie. [14:46:51] [connection] 83.234.82.33:42286 requests connection cookie. [14:46:51] [connection] 89.112.28.32:39682 requests connection cookie. [14:46:51] [connection] 109.187.200.171:38954 requests connection cookie. [14:46:51] [connection] 37.195.14.77:20785 requests connection cookie. [14:46:51] [connection] 31.8.241.235:38754 requests connection cookie. [14:46:51] [connection] 188.235.230.94:45832 requests connection cookie. [14:46:51] [connection] 176.209.52.138:43054 requests connection cookie. [14:46:51] [connection] 95.167.250.222:44040 requests connection cookie. [14:46:51] [connection] 109.188.12.137:38375 requests connection cookie. [14:46:51] [connection] 95.25.205.176:36280 requests connection cookie. [14:46:51] [connection] 178.141.161.158:21356 requests connection cookie. [14:46:51] [connection] 144.206.231.190:35580 requests connection cookie. [14:46:51] [connection] 212.164.23.23:20200 requests connection cookie. [14:46:51] [connection] 178.234.197.173:28119 requests connection cookie. [14:46:51] [connection] 77.51.18.145:57629 requests connection cookie. [14:46:51] [connection] 188.43.137.215:35599 requests connection cookie. [14:46:51] [connection] 178.47.151.101:53270 requests connection cookie. [14:46:51] [connection] 37.79.63.112:46005 requests connection cookie. [14:46:51] [connection] 178.187.192.2:25688 requests connection cookie. [14:46:51] [connection] 176.15.197.173:45991 requests connection cookie. [14:46:51] [connection] 95.167.68.222:36052 requests connection cookie. [14:46:51] [connection] 90.150.13.137:53589 requests connection cookie. [14:46:51] [connection] 37.113.251.62:49155 requests connection cookie. [14:46:51] [connection] 188.43.80.175:21110 requests connection cookie. |
Lo voy a explicar por si alguien entra buscando una soluciуn para detener un ataque o vaya a saber, no es mi intenciуn intentar mejorar o dar lecciones.
Estos son los problemas que le veo y de seguro que otros muchos "n00b" al igual que yo tambiйn ven: Todos los puertos abiertos: Код:
iptables -P INPUT ACCEPT iptables -P FORWARD ACCEPT iptables -P OUTPUT ACCEPT Код:
iptables -A INPUT -p udp --dport 7777 -j ACCEPT iptables -A OUTPUT -p udp --sport 7777 -j ACCEPT iptables -A INPUT -p tcp --dport 22 -j ACCEPT iptables -A OUTPUT -p tcp --sport 22 -j ACCEPT Код:
iptables -A INPUT -p tcp -m tcp --sport 53 -m state --state ESTABLISHED -j ACCEPT iptables -A INPUT -p udp -m udp --sport 53 -m state --state ESTABLISHED -j ACCEPT iptables -A OUTPUT -p tcp -m tcp --dport 53 -m state --state NEW,ESTABLISHED -j ACCEPT iptables -A OUTPUT -p udp -m udp --dport 53 -m state --state NEW,ESTABLISHED -j ACCEPT iptables -A INPUT -p tcp -m tcp --sport 80 -m state --state ESTABLISHED -j ACCEPT iptables -A OUTPUT -p tcp -m tcp --dport 80 -m state --state NEW,ESTABLISHED -j ACCEPT iptables -A INPUT -p tcp -m tcp --sport 25 -m state --state ESTABLISHED -j ACCEPT iptables -A OUTPUT -p tcp -m tcp --dport 25 -m state --state NEW,ESTABLISHED -j ACCEPT icmp-flood - No es necesario protegerse si la polнtica por defecto es DROP. udp-flood - Lo ъnico que se consigue con esto es bloquear a los propios jugadores, el propio SA-MP envнa miles de paquetes por segundo. syn-flood - No es necesario protegerse de esto si no contamos con un servidor web, si fuera el caso, esto es un foro de SA-MP, pero bueno, da igual. Y para rematarlo, un ataque DoS de un novato no tira un servidor de SA-MP, una conexiуn casera nunca va a saturar a un servidor dedicado. |
Si no te funciona lo del compaсero arriba mandame un MP y lo hablamos
|