hi I have a IPTables firewall and a automatically generated html log-file of my DROP chain via fwlogwatch. Since a long time these logs are bloated from incoming requests at Port 4665 (edonkey). I wonder why there are so many retries... Now I have to decide between two possibilities: 1. Instead of DROPping with my own (logging)drop chain, only DROP without Logging. 2. REJECT the requests instead of DROPping. maybe the second variant preserve me from thousands of requests within a hour, but on the other hand I outed myself with that and the edonkey scanners (or whatever the source of the requests will be) are so tricky to try all other ports to connect... does anyone have an advice? harald -- Microsoft is not the answer, its the question And the answer is no.
On Mon, 30 Dec 2002, Nikolisin, Harald wrote:
Since a long time these logs are bloated from incoming requests at Port 4665 (edonkey). I wonder why there are so many retries...
Now I have to decide between two possibilities: 1. Instead of DROPping with my own (logging)drop chain, only DROP without Logging. 2. REJECT the requests instead of DROPping.
does anyone have an advice?
see the --limit and --limit-burst options of iptables Achim
participants (2)
-
Achim Hoffmann
-
Nikolisin, Harald