Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ iptables geo whitelist logging lots of blocked connection attemps

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š iptables geo whitelist logging lots of blocked connection attemps


๐Ÿ’ก Newskategorie: Linux Tipps
๐Ÿ”— Quelle: reddit.com

I am from Australia and I have a Raspberry Pi server open on port 443, and a few other random ports for other things. Since I wanted to secure it, I looked into making a whitelist for Australia on iptables and ipset (to allow Australian IPs and block everything else), this includes a script that automatically runs on boot to add the rules and another separate script that periodically updates the list of IPs for Australia. I can post the setup a bit later if you're interested.

It all works ok, but I'm curious why there are so many logged events showing up in /var/log/kern.log

Here are my iptables rules:

*filter -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT -A INPUT -i lo -m comment --comment "Allow loopback connections" -j ACCEPT -A INPUT -s 192.168.1.0/24 -m comment --comment "Allow local network" -j ACCEPT -A INPUT -s 10.8.0.0/24 -m comment --comment "Allow openvpn network" -j ACCEPT -A INPUT -p tcp -m set --match-set australia src --match multiport --dports 21,80,443 -j ACCEPT -A INPUT -p udp -m set --match-set australia src --dport 1194 -j ACCEPT -A INPUT -m limit --limit 5/min -j LOG --log-prefix "INPUT DROP: " --log-level 4 -A INPUT -j DROP COMMIT 

As an example here are a whole bunch from only the last 10 minutes in /var/log/kern.log:

Jan 28 21:52:28 RASP-PI kernel: [11066.426546] INPUT DROP: IN=eth0 OUT= MAC=[] SRC=74.125.24.188 DST=192.168.1.100 LEN=903 TOS=0x00 PREC=0x00 TTL=123 ID=33830 PROTO=TCP SPT=5228 DPT=8999 WINDOW=403 RES=0x00 ACK PSH URGP=0 Jan 28 21:52:32 RASP-PI kernel: [11070.910190] INPUT DROP: IN=eth0 OUT= MAC=[] SRC=74.125.24.188 DST=192.168.1.100 LEN=903 TOS=0x00 PREC=0x00 TTL=123 ID=36374 PROTO=TCP SPT=5228 DPT=8999 WINDOW=403 RES=0x00 ACK PSH URGP=0 Jan 28 21:52:41 RASP-PI kernel: [11079.612522] INPUT DROP: IN=eth0 OUT= MAC=[] SRC=74.125.24.188 DST=192.168.1.100 LEN=903 TOS=0x00 PREC=0x00 TTL=123 ID=40801 PROTO=TCP SPT=5228 DPT=8999 WINDOW=403 RES=0x00 ACK PSH URGP=0 Jan 28 21:52:50 RASP-PI kernel: [11088.704625] INPUT DROP: IN=eth0 OUT= MAC=[] SRC=185.153.198.211 DST=192.168.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=46926 PROTO=TCP SPT=59243 DPT=443 WINDOW=1024 RES=0x00 SYN URGP=0 Jan 28 21:52:58 RASP-PI kernel: [11097.017849] INPUT DROP: IN=eth0 OUT= MAC=[] SRC=74.125.24.188 DST=192.168.1.100 LEN=903 TOS=0x00 PREC=0x00 TTL=123 ID=52096 PROTO=TCP SPT=5228 DPT=8999 WINDOW=403 RES=0x00 ACK PSH URGP=0 Jan 28 21:53:20 RASP-PI kernel: [11118.595684] INPUT DROP: IN=eth0 OUT= MAC=[] SRC=173.82.94.209 DST=192.168.1.100 LEN=60 TOS=0x00 PREC=0x00 TTL=58 ID=42575 DF PROTO=TCP SPT=47482 DPT=8080 WINDOW=29200 RES=0x00 SYN URGP=0 Jan 28 21:53:21 RASP-PI kernel: [11119.598917] INPUT DROP: IN=eth0 OUT= MAC=[] SRC=173.82.94.209 DST=192.168.1.100 LEN=60 TOS=0x00 PREC=0x00 TTL=58 ID=42576 DF PROTO=TCP SPT=47482 DPT=8080 WINDOW=29200 RES=0x00 SYN URGP=0 Jan 28 21:53:27 RASP-PI kernel: [11125.619353] INPUT DROP: IN=eth0 OUT= MAC=[] SRC=173.82.94.209 DST=192.168.1.100 LEN=60 TOS=0x00 PREC=0x00 TTL=58 ID=42578 DF PROTO=TCP SPT=47482 DPT=8080 WINDOW=29200 RES=0x00 SYN URGP=0 Jan 28 21:54:15 RASP-PI kernel: [11173.831267] INPUT DROP: IN=eth0 OUT= MAC=[] SRC=178.252.176.218 DST=192.168.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=234 ID=54321 PROTO=TCP SPT=57583 DPT=443 WINDOW=65535 RES=0x00 SYN URGP=0 Jan 28 21:59:17 RASP-PI kernel: [11475.734373] INPUT DROP: IN=eth0 OUT= MAC=[] SRC=66.240.205.34 DST=192.168.1.100 LEN=44 TOS=0x00 PREC=0x00 TTL=116 ID=4496 PROTO=TCP SPT=17340 DPT=8080 WINDOW=25360 RES=0x00 SYN URGP=0 

It's confusing me a bit because port 8080 isn't even forwarded on my router. A bunch of other random ports sometimes get logged too even though they shouldn't even be getting through to my pi. Any idea why this is?

According to some of these IPs, some are from the US, Ukraine, India, China, so the firewall is definitely working. I assume these IPs are bots? Should this be something to worry about?

submitted by /u/GammaScorpii
[link] [comments] ...



๐Ÿ“Œ iptables geo whitelist logging lots of blocked connection attemps


๐Ÿ“ˆ 142.59 Punkte

๐Ÿ“Œ VPN-Whitelist - Whitelist domains and addresses to bypass an active VPN connection


๐Ÿ“ˆ 46.3 Punkte

๐Ÿ“Œ [shellcode] Linux/x86-64 - execve("/sbin/iptables", ["/sbin/iptables", "-F"], NULL) Shellcode (43 bytes)


๐Ÿ“ˆ 34.1 Punkte

๐Ÿ“Œ #0daytoday #Linux/x86-64 - execve (/sbin/iptables, [/sbin/iptables, -F], NULL) Shellcode (43 bytes) [#0day #Exploit]


๐Ÿ“ˆ 34.1 Punkte

๐Ÿ“Œ [shellcode] Linux/x86 - Flush IPTables Rules (/sbin/iptables -F) + exit() Shellcode (58 bytes)


๐Ÿ“ˆ 34.1 Punkte

๐Ÿ“Œ Iptables and Docker: Securely Running Containers with Iptables


๐Ÿ“ˆ 34.1 Punkte

๐Ÿ“Œ Geo-Recon - An OSINT CLI Tool Desgined To Fast Track IP Reputation And Geo-locaton Look Up For Security Analysts


๐Ÿ“ˆ 33.47 Punkte

๐Ÿ“Œ Iptables and logging: How to monitor network traffic


๐Ÿ“ˆ 30.09 Punkte

๐Ÿ“Œ Best VPN For Estonia in 2019: Access Geo-blocked Content


๐Ÿ“ˆ 29.87 Punkte

๐Ÿ“Œ Best VPN For Estonia in 2019: Access Geo-blocked Content


๐Ÿ“ˆ 29.87 Punkte

๐Ÿ“Œ Lots of debug log is written after commons-logging is upgraded to 1.3.0


๐Ÿ“ˆ 28.21 Punkte

๐Ÿ“Œ IPTables/Netfilter on Linux Kernel 2.4.20 Connection Tracker denial of service


๐Ÿ“ˆ 27.7 Punkte

๐Ÿ“Œ iptables rule to allow only 2 tcp connection attempts per second


๐Ÿ“ˆ 27.7 Punkte

๐Ÿ“Œ Microservices Logging | A Practical Guide to Logging in Microservices


๐Ÿ“ˆ 26.09 Punkte

๐Ÿ“Œ Using WPS Office (or any app you want) with blocked internet connection


๐Ÿ“ˆ 23.79 Punkte

๐Ÿ“Œ Fix: Connection Blocked After Timeout Error in TeamViewer


๐Ÿ“ˆ 23.79 Punkte

๐Ÿ“Œ Help Understanding Outbound Connection Logging on Windows Firewall


๐Ÿ“ˆ 23.7 Punkte

๐Ÿ“Œ The Illustrated TLS Connection - Every byte of a TLS connection explained and reproduced


๐Ÿ“ˆ 21.31 Punkte

๐Ÿ“Œ Inbound Connection Vs Outbound Connection.


๐Ÿ“ˆ 21.31 Punkte

๐Ÿ“Œ Blue Coat SSL Visibility up to 3.11.3.0 SSL Connection TCP Connection denial of service


๐Ÿ“ˆ 21.31 Punkte

๐Ÿ“Œ Cisco Unity Connection Bulk Administration Tool Connection Request denial of service


๐Ÿ“ˆ 21.31 Punkte

๐Ÿ“Œ H2O bis 1.7.2/2.0.0-beta4 HTTP2 Connection Handler lib/http2/connection.c Pufferรผberlauf


๐Ÿ“ˆ 21.31 Punkte

๐Ÿ“Œ Tendermint up to 0.31.11/0.32.9/0.33.2 P2P Connection Connection Request uncontrolled memory allocation


๐Ÿ“ˆ 21.31 Punkte

๐Ÿ“Œ CVE-2016-4817 | H2O up to 1.7.2/2.0.0-beta4 HTTP2 Connection lib/http2/connection.c use after free


๐Ÿ“ˆ 21.31 Punkte

๐Ÿ“Œ Connection problem, every connection has 0 segnal strenght. please tell me there Is a fix


๐Ÿ“ˆ 21.31 Punkte

๐Ÿ“Œ H2O bis 1.7.2/2.0.0-beta4 HTTP2 Connection Handler lib/http2/connection.c Pufferรผberlauf


๐Ÿ“ˆ 21.31 Punkte

๐Ÿ“Œ The Power of connection: How practicing connection can transform teamwork within your organization


๐Ÿ“ˆ 21.31 Punkte

๐Ÿ“Œ MySQL Connection Security With Connection Control Plugins


๐Ÿ“ˆ 21.31 Punkte

๐Ÿ“Œ Blue Coat SSL Visibility bis 3.11.3.0 SSL Connection TCP Connection Denial of Service


๐Ÿ“ˆ 21.31 Punkte

๐Ÿ“Œ Apache Cordova iOS bis 3.x URL Whitelist erweiterte Rechte


๐Ÿ“ˆ 17.82 Punkte

๐Ÿ“Œ Firefox 47 Ends Plugins Whitelist (May 6, 2016)


๐Ÿ“ˆ 17.82 Punkte

๐Ÿ“Œ Firefox 47 Fixes 13 Vulnerabilities, Removes Click-To-Activate Plugin Whitelist


๐Ÿ“ˆ 17.82 Punkte

๐Ÿ“Œ [webapps] - Pi-Hole Web Interface 2.8.1 - Stored XSS in Whitelist/Blacklist


๐Ÿ“ˆ 17.82 Punkte

๐Ÿ“Œ Whitelist


๐Ÿ“ˆ 17.82 Punkte

๐Ÿ“Œ Whitelist Relationships as a Path to Better Security


๐Ÿ“ˆ 17.82 Punkte











matomo