Advertisement
Creeper96

Untitled

Jul 13th, 2015
213
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.11 KB | None | 0 0
  1. #!/bin/bash
  2. HIT='9'
  3. SECONDS='30'
  4. echo "Cancello iptables"
  5. iptables -F INPUT
  6. iptables -F OUTPUT
  7. iptables -F Minecraft
  8. iptables -t raw -F
  9. iptables -X Minecraft
  10.  
  11. #protezione basilare
  12. iptables -A INPUT -p gre -j ACCEPT
  13. iptables -A OUTPUT -p gre -j ACCEPT
  14.  
  15.  
  16. echo "Creo le regole"
  17. iptables -N Minecraft
  18. iptables -A INPUT -i eth0 -p tcp -m tcp --dport 25565 -m state --state NEW -j Minecraft
  19. iptables -A Minecraft -m recent --set --name BOT --rsource
  20. iptables -A Minecraft -m recent --update --seconds $SECONDS --hitcount $HIT --name BOT --rsource
  21. -j LOG --log-prefix "Attacco BOT in corso " --log-level 6
  22. echo "blocco"
  23. iptables -A Minecraft -p tcp -m recent --update --seconds $SECONDS --hitcount $HIT --name BOT --r
  24. source -j DROP
  25. echo "Fine creazione"
  26.  
  27.  
  28. iptables -A OUTPUT -p udp --dport 53 -d 62.141.32.5 -j ACCEPT
  29. iptables -A OUTPUT -p udp --dport 53 -d 62.141.32.4 -j ACCEPT
  30. iptables -A OUTPUT -p udp --dport 53 -d 62.141.32.3 -j ACCEPT
  31. iptables -A OUTPUT -p udp --dport 53 -d 62.141.32.2 -j ACCEPT
  32.  
  33.  
  34. iptables -A INPUT -p tcp --syn --dport 25565 -m connlimit --connlimit-above 4 -j LOG --log-prefix
  35. "TROPPE CONNESSIONI " --log-level 6
  36. iptables -A INPUT -p tcp --syn --dport 25565 -m connlimit --connlimit-above 4 -j DROP
  37.  
  38.  
  39. iptables -A INPUT -m state --state INVALID -j DROP
  40. iptables -A INPUT -p tcp ! --syn -m state --state NEW -j DROP
  41. iptables -A INPUT -f -j DROP
  42. iptables -A INPUT -p tcp --tcp-flags ALL ALL -j DROP
  43. iptables -A INPUT -p tcp --tcp-flags ALL NONE -j DROP
  44.  
  45.  
  46.  
  47.  
  48.  
  49. #configurazioni kernel
  50. sysctl -w net/ipv4/tcp_syncookies=1
  51. sysctl -w net/ipv4/tcp_timestamps=1
  52. sysctl -w net/netfilter/nf_conntrack_tcp_loose=0
  53. echo 2500000 > /sys/module/nf_conntrack/parameters/hashsize
  54. sysctl -w net/netfilter/nf_conntrack_max=2000000
  55.  
  56.  
  57.  
  58. #protezione connectTrack
  59. iptables -t raw -I PREROUTING -p tcp --syn -j CT --notrack
  60. iptables -I INPUT -p tcp -m tcp -m conntrack --ctstate INVALID,UNTRACKED -j SYNPROXY --sack-perm
  61. --timestamp --wscale 7 --mss 1460
  62. iptables -A INPUT -m conntrack --ctstate INVALID -j DROP
  63.  
  64.  
  65.  
  66.  
  67.  
  68. #Blocco tutto il traffico UDP eccetto i DNS
  69. echo "Protocollo UDP Bloccato"
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement