Le 2/13/23 à 3:16 PM, Simon Matter a écrit :
Hi Yassine, Isn't it possible that all the requests you see are coming in over the already established TCP connection? I guess only new connections will then be blocked.
Thank you Simon for your answer. It could have been, yes. Apache logs show that the IP stopped trying at 09:57, but tried again at 14:11. This is really weired. Check the grep output below : [code] root@messagerie-principale[10.10.10.19] ~ # for file in /var/log/apache2/*; do grep -H 162.241.181.215 $file | tail -1; done ---> /var/log/apache2/mail.radioalgerie.dz.access.1:162.241.181.215 - - [13/Feb/2023:09:57:05 +0100] "GET /wp-login.php.bak HTTP/1.1" 404 5082 "-" "Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2224.3 Safari/537.36" <--- /var/log/apache2/mail.radioalgerie.dz.error.1:[Mon Feb 13 08:55:12.770692 2023] [:error] [pid 1508] [client 162.241.181.215:36254] script '/var/www/roundcubemail-1.2.4/login.php' not found or unable to stat ---> /var/log/apache2/roundcube.access.1:162.241.181.215 - - [13/Feb/2023:14:11:11 +0100] "GET /jwt/private.pem HTTP/1.1" 301 580 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36" <--- /var/log/apache2/roundcube.error.1:[Mon Feb 13 08:56:03.854510 2023] [:error] [pid 1513] [client 162.241.181.215:45126] script '/var/www/roundcubemail-1.2.4/login.php' not found or unable to stat root@messagerie-principale[10.10.10.19] ~ # [/code]
I remember that I once used this tool https://directory.fsf.org/wiki/Cutter to terminate established connections in such a situation.
Great! Another tool to add to my toolbox, this is really useful. Thanks a lot! By the way, the dynamic chain stats for the particular IP have significantly augmented since yesterday, to it seems the ban is in place [code] root@messagerie-principale[10.10.10.19] ~ # shorewall show dynamic | tail 0 0 logdrop all -- * * 212.227.15.0/24 0.0.0.0/0 0 0 reject all -- * * 104.168.34.178 0.0.0.0/0 0 0 reject all -- * * 104.168.34.177 0.0.0.0/0 11 660 reject all -- * * 105.102.42.31 0.0.0.0/0 20 1200 reject all -- * * 105.96.195.57 0.0.0.0/0 0 0 reject all -- * * 41.108.14.140 0.0.0.0/0 # * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * # # 4223 253K logdrop all -- * * 162.241.181.215 0.0.0.0/0 # # * * * * * * * * * * * * * * * * * * * * * * * * * * * * * * # 1037 62220 reject all -- * * 91.103.252.239 0.0.0.0/0 181 10860 reject all -- * * 91.103.252.248 0.0.0.0/0 root@messagerie-principale[10.10.10.19] ~ # [/code] yesterday : [code] 185 11100 logdrop all -- * * 162.241.181.215 0.0.0.0/0 [/code] So the question only remains for the packet that got through at 14:11, nearly 4 hours after the ban. _______________________________________________ Shorewall-users mailing list Shorewall-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/shorewall-users