tmello
(usa Debian)
Enviado em 21/08/2013 - 16:17h
Atualmente as regras estão assim.
#!/bin/sh
IPT=/sbin/iptables
UNPRIPORTS="1024:65535"
INET_IFACE="venet0"
$IPT -A INPUT -i lo -j ACCEPT
$IPT -A OUTPUT -o lo -j ACCEPT
$IPT -A OUTPUT -o venet0 -j ACCEPT
$IPT -A INPUT -i venet0 -p tcp --dport 22 -j ACCEPT
$IPT -A INPUT -i venet0 -p tcp -m tcp --dport 2106 -j ACCEPT
$IPT -A INPUT -i venet0 -p tcp --dport 7000 -j ACCEPT
$IPT -A INPUT -i venet0 -p tcp --dport 80 -j ACCEPT
$IPT -A INPUT -i venet0 -p tcp --dport 3306 -j ACCEPT -s 127.0.0.1
$IPT -A INPUT -i venet0 -p tcp -m tcp --dport 7777 -j DROP
$IPT -I INPUT -i venet0 -p tcp --dport 2106 -m connlimit --connlimit-above 2 -j DROP
$IPT -I INPUT -i venet0 -p tcp --dport 7777 -m connlimit --connlimit-above 5 -j DROP
$IPT -A INPUT -p icmp -i venet0 -j ACCEPT
$IPT -A INPUT -i venet0 -p tcp --dport 25 -j ACCEPT
$IPT -A INPUT -i venet0 -p tcp --dport 110 -j ACCEPT
$IPT -A INPUT -i venet0 -p tcp -m tcp --tcp-flags FIN,SYN,ACK SYN -j REJECT --reject-with icmp-port-unreachable
$IPT -A INPUT -p icmp --icmp-type 8 -s 0/0
$IPT -A INPUT -p udp -m udp -i $INET_IFACE --dport $UNPRIPORTS --sport 53 -j ACCEPT
$IPT -A INPUT -p tcp -m tcp -i $INET_IFACE --dport 1024:65353 --sport 53 -j ACCEPT
$IPT -A INPUT -p tcp -m tcp -i $INET_IFACE --dport $UNPRIPORTS --sport 21 -j ACCEPT ! --syn
$IPT -A INPUT -p tcp -m tcp -m multiport -i $INET_IFACE --dport $UNPRIPORTS -j ACCEPT --sports 80,443 ! --syn
$IPT -A INPUT -p tcp -m tcp -i $INET_IFACE --dport $UNPRIPORTS --sport 25 -j ACCEPT
$IPT -P INPUT DROP
$IPT -P OUTPUT ACCEPT
-----
Dei uma olhada no arquivo que me indicou dar uma olhada, boa parte das opções que vc citou não existe no arquivo, SO Debian 6 64 bit.
-----
São utilizadas as portas 2106 e 7777 ambas TCP, são portas de comunicação client > servidor.
-----
Não sei quase nada a respeito de programas DoS ou DDoS, baixei um tal de server attacker 3.0 que a grande parte dos jogadores de Lineage usam.
-----
Configuração atual /etc/sysctl.cong
#
# /etc/sysctl.conf - Configuration file for setting system variables
# See /etc/sysctl.d/ for additonal system variables
# See sysctl.conf (5) for information.
#
#kernel.domainname = example.com
# Uncomment the following to stop low-level messages on console
#kernel.printk = 3 4 1 3
##############################################################3
# Functions previously found in netbase
#
# Uncomment the next two lines to enable Spoof protection (reverse-path filter)
# Turn on Source Address Verification in all interfaces to
# prevent some spoofing attacks
#net.ipv4.conf.default.rp_filter=1
#net.ipv4.conf.all.rp_filter=1
# Uncomment the next line to enable TCP/IP SYN cookies
# See
http://lwn.net/Articles/277146/
# Note: This may impact IPv6 TCP sessions too
net.ipv4.tcp_syncookies=1
# Uncomment the next line to enable packet forwarding for IPv4
#net.ipv4.ip_forward=1
# Uncomment the next line to enable packet forwarding for IPv6
# Enabling this option disables Stateless Address Autoconfiguration
# based on Router Advertisements for this host
#net.ipv6.conf.all.forwarding=1
###################################################################
# Additional settings - these settings can improve the network
# security of the host and prevent against some network attacks
# including spoofing attacks and man in the middle attacks through
# redirection. Some network environments, however, require that these
# settings are disabled so review and enable them as needed.
#
# Do not accept ICMP redirects (prevent MITM attacks)
net.ipv4.conf.all.accept_redirects = 0
#net.ipv6.conf.all.accept_redirects = 0
# _or_
# Accept ICMP redirects only for gateways listed in our default
# gateway list (enabled by default)
# net.ipv4.conf.all.secure_redirects = 1
#
# Do not send ICMP redirects (we are not a router)
#net.ipv4.conf.all.send_redirects = 0
#
# Do not accept IP source route packets (we are not a router)
net.ipv4.conf.all.accept_source_route = 0
#net.ipv6.conf.all.accept_source_route = 0
#
# Log Martian Packets
#net.ipv4.conf.all.log_martians = 1
#