ich habe einen root-Server und diesen auch entspr. abgesichert: Es läuft nginx als Reverse-Proxy zu Apache2, sowie ein Extra-vhost, wo nur Apache2 wartet.
iptables sieht wie folgt aus:
Code: Alles auswählen
sudo iptables -L
Chain INPUT (policy DROP)
target prot opt source destination
ACCEPT all -- localhost anywhere
ACCEPT tcp -- anywhere anywhere tcp dpt:ssh
ACCEPT tcp -- anywhere anywhere tcp dpt:www
ACCEPT tcp -- anywhere anywhere tcp dpt:kerberos
ACCEPT tcp -- anywhere anywhere tcp dpt:https
syn_flood tcp -- anywhere anywhere tcp flags:FIN,SYN,RST,ACK/SYN
ACCEPT icmp -- anywhere anywhere limit: avg 2/sec burst 2
DROP icmp -- anywhere anywhere
ACCEPT udp -- 8.26.56.26 anywhere udp dpt:domain state NEW
ACCEPT tcp -- 8.26.56.26 anywhere tcp dpt:domain state NEW
ACCEPT udp -- 156.154.70.22 anywhere udp dpt:domain state NEW
ACCEPT tcp -- 156.154.70.22 anywhere tcp dpt:domain state NEW
Chain FORWARD (policy DROP)
target prot opt source destination
ACCEPT all -- localhost anywhere
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
ACCEPT icmp -- anywhere anywhere
Chain syn_flood (1 references)
target prot opt source destination
RETURN all -- anywhere anywhere limit: avg 10/sec burst 20
DROP all -- anywhere anywhere
Code: Alles auswählen
cat /etc/resolv.conf
nameserver 8.26.56.26
nameserver 156.154.70.22