Tags » Iptables

There is nothing like (missing) iptables (rules) to make you use tor

I have been fiddling with setting up both iptables and tor on my local machine.  Most of it was fairly easy to do, once I dedicated the time to actually do it. 215 more words


Secure you Linux box

It is highly !recommended to create a user account and use that all times instead of root

adduser exampleuser
passwd exampleuser

Give user sudo rights… 347 more words


Blocking Brute Force & Dictionary Attacks under Linux Using Fail2ban

Fail2ban scans log files and bans IPs that show the malicious signs — too many password failures, seeking for exploits, etc. Generally Fail2Ban is then used to update firewall rules to reject the IP addresses for a specified amount of time, although any arbitrary other action (e.g. 37 more words


Site to Site VPNs with NAT and IPSEC

In this post we will be discussing a site to site VPN based on the following topology:

Company1 > VPN Gateway > IPSec Tunnel > VPN Gateway > Company2… 195 more words


State tracking within IPTABLES

Tracking the state of connections permits IPTABLES to function as a stateful firewall.

Packets can be matched to tracked connections.

There are four different ‘states’ which we can use to write specific rulesets with: 297 more words