Advertisement
Guest User

Untitled

a guest
Jun 19th, 2019
118
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.42 KB | None | 0 0
  1. # iptables -I INPUT -p tcp --tcp-flags SYN SYN -m tcpmss --mss 1:500 -j DROP
  2. # ip6tables -I INPUT -p tcp --tcp-flags SYN SYN -m tcpmss --mss 1:500 -j DROP
  3. # iptables -nL -v
  4. # ip6tables -nL -v
  5. This option will drop connection attempts with an MSS size between 1 and 500. Please note it might also deny some connections that may be considered valid. This mitigation works as long as net.ipv4.tcp_mtu_probing is disabled.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement