thanks heaps,

I have downloaded them, and when I wake up tomorrow, i'll start putting them
up..

thanks again


rgds

Frank

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of James Sparenberg
Sent: Friday, 21 September 2001 12:23 AM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Subject: Re: [expert] blocking


Franki,
   I've got the one I use for IPChains and IPtables (different boxes
different Kernels I don't change what works without bugs.)  You can grab
my tarballs and see the text for the article I wrote for Linux Journal
(Don't know if they published it or not.)  It uses a PHP file which for
code red is named default.ida that grabs the IP number of the offending
box.  Then it puts it into a List for IP chains or IP tables that they
grab on a cron job, create the rule to block that IP number and then
voila.  That box is totally blocked.  I've tested it and it works like a
charm.  Saves bandwidth as well.

  You can grab the tarballs or the text for the article explaining how it
works at http://www.opencountry.net/~james/  Have fun.

James Sparenberg
Director New Product Development
Open Country Inc.

On Wed, 19 Sep 2001 20:42:02 +0800
"Franki" <[EMAIL PROTECTED]> wrote:

>
> Hi all,
>
>
> Does anyone know a way using shell/perl scripting and ipchains to block
> all
> urls that request cmd.exe, root.exe, admin.dll and all the others???
> (from
> port 80 of course....)
>
>
> I am getting thousands of sustained requests from infected NT/2000
> servers
> and its chewing alot of bandwidth..
>
> I may have to shutdown my server for a couple of days if it doens't stop
> as
> its bound to cause a spike in usage and my bill..
>
>
> anyone got any ideas???
>
>
> rgds
>
> Frank
>
>
>



Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com

Reply via email to