Your message dated Wed, 12 Oct 2005 11:12:58 +0900
with message-id <[EMAIL PROTECTED]>
and subject line Bug#333350: ipt_recent kernel module suffers from jiffies 
rollover
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 11 Oct 2005 13:46:07 +0000
>From [EMAIL PROTECTED] Tue Oct 11 06:46:07 2005
Return-path: <[EMAIL PROTECTED]>
Received: from comedy.dante.de [80.237.210.73] 
        by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
        id 1EPKSE-0007Tz-00; Tue, 11 Oct 2005 06:46:06 -0700
Received: from comedy.dante.de (localhost. [127.0.0.1])
        by comedy.dante.de (8.13.4/8.13.4/Debian-3) with ESMTP id j9BDk35B007367
        for <[EMAIL PROTECTED]>; Tue, 11 Oct 2005 15:46:03 +0200
Received: (from [EMAIL PROTECTED])
        by comedy.dante.de (8.13.4/8.13.4/Submit) id j9BDk3Ul007366;
        Tue, 11 Oct 2005 15:46:03 +0200
Message-Id: <[EMAIL PROTECTED]>
X-Authentication-Warning: comedy.dante.de: ftpmaint set sender to [EMAIL 
PROTECTED] using -f
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: =?iso-8859-15?q?Rainer_Sch=C3=B6pf?= <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: ipt_recent kernel module suffers from jiffies rollover
X-Mailer: reportbug 3.8
Date: Tue, 11 Oct 2005 15:46:03 +0200
X-Debbugs-Cc: [EMAIL PROTECTED]
X-DANTE-Spam-Score: -2.399 () ALL_TRUSTED,AWL
X-Scanned-By: MIMEDefang 2.51 on 80.237.210.73
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-11.0 required=4.0 tests=BAYES_00,HAS_PACKAGE,
        X_DEBBUGS_CC autolearn=ham version=2.60-bugs.debian.org_2005_01_02

Package: kernel-image-2.6.8-2-686-smp
Version: 2.6.8-16
Severity: serious

The ipt_recnet kernel module suffers from a wraparound of the jiffies
counter. The problem is described by the module author on

  http://blog.blackdown.de/2005/05/09/fixing-the-ipt_recent-netfilter-module/

Since the correrction didn't make it into the official kernel sources,
I would be very grateful if the debian kernels could pick up the change.

For reference:

I use the ipt_recent kernel module to protect against ssh attacks,
with the following rules:

iptables -A dante_in -p tcp -m tcp --dport 22 -m state --state NEW -m recent 
--set --name SSH --rsource
iptables -A dante_in -p tcp -m tcp --dport 22 -m state --state NEW -m recent 
--update --seconds 60 --hitcount 4 --rttl --name SSH --rsource -j ULOG 
--ulog-prefix "DROP SSH_brute_force:" --ulog-cprange 64
iptables -A dante_in -p tcp -m tcp --dport 22 -m state --state NEW -m recent 
--update --seconds 60 --hitcount 4 --rttl --name SSH --rsource -j DROP

After several weeks, ssh logins fail if they come from an IP address not
yet known to the ipt_recent module.  Reboot helps.

 Rainer Schoepf


-- System Information:
Debian Release: 3.1
Architecture: i386 (i686)
Kernel: Linux 2.6.8-2-686-smp
Locale: LANG=en_US.ISO-8859-15, LC_CTYPE=en_US.ISO-8859-15 (charmap=ISO-8859-15)

Versions of packages kernel-image-2.6.8-2-686-smp depends on:
ii  coreutils [fileutils]         5.2.1-2    The GNU core utilities
ii  fileutils                     5.2.1-2    The GNU file management utilities 
ii  initrd-tools                  0.1.81.1   tools to create initrd image for p
ii  module-init-tools             3.2-pre1-2 tools for managing Linux kernel mo

-- no debconf information

---------------------------------------
Received: (at 333350-done) by bugs.debian.org; 12 Oct 2005 04:33:51 +0000
>From [EMAIL PROTECTED] Tue Oct 11 21:33:51 2005
Return-path: <[EMAIL PROTECTED]>
Received: from koto.vergenet.net [210.128.90.7] 
        by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
        id 1EPYJL-0007Rc-00; Tue, 11 Oct 2005 21:33:51 -0700
Received: by koto.vergenet.net (Postfix, from userid 7100)
        id BA79834032; Wed, 12 Oct 2005 13:33:18 +0900 (JST)
Date: Wed, 12 Oct 2005 11:12:58 +0900
From: Horms <[EMAIL PROTECTED]>
To: Rainer =?iso-8859-1?Q?Sch=C3=B6pf?= <[EMAIL PROTECTED]>,
        [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: Re: Bug#333350: ipt_recent kernel module suffers from jiffies rollover
Message-ID: <[EMAIL PROTECTED]>
References: <[EMAIL PROTECTED]>
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
In-Reply-To: <[EMAIL PROTECTED]>
X-Cluestick: seven
User-Agent: Mutt/1.5.11
Content-Transfer-Encoding: quoted-printable
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-CrossAssassin-Score: 2

On Tue, Oct 11, 2005 at 03:46:03PM +0200, Rainer Sch=C3=B6pf wrote:
> Package: kernel-image-2.6.8-2-686-smp
> Version: 2.6.8-16
> Severity: serious
>=20
> The ipt_recnet kernel module suffers from a wraparound of the jiffies
> counter. The problem is described by the module author on
>=20
>   http://blog.blackdown.de/2005/05/09/fixing-the-ipt_recent-netfilter-m=
odule/
>=20
> Since the correrction didn't make it into the official kernel sources,
> I would be very grateful if the debian kernels could pick up the change=
.

Unfortunately the patch didn't make it upstream because it is not correct=
.

This bug (333350) is actually a duplicate of 332231. I am forwarding your
informtion to that bug and closing this one.

Thanks

> For reference:
>=20
> I use the ipt_recent kernel module to protect against ssh attacks,
> with the following rules:
>=20
> iptables -A dante_in -p tcp -m tcp --dport 22 -m state --state NEW -m r=
ecent --set --name SSH --rsource
> iptables -A dante_in -p tcp -m tcp --dport 22 -m state --state NEW -m r=
ecent --update --seconds 60 --hitcount 4 --rttl --name SSH --rsource -j U=
LOG --ulog-prefix "DROP SSH_brute_force:" --ulog-cprange 64
> iptables -A dante_in -p tcp -m tcp --dport 22 -m state --state NEW -m r=
ecent --update --seconds 60 --hitcount 4 --rttl --name SSH --rsource -j D=
ROP
>=20
> After several weeks, ssh logins fail if they come from an IP address no=
t
> yet known to the ipt_recent module.  Reboot helps.
>=20
>  Rainer Schoepf

--=20
Horms


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to