• 22-12-2008, 20:03:22
    #1
    Öncelikle s.a
    iptables ile alakali büyük bi sorun yaşıyorum
    sunucu hergun duzenli olarak sabah 11 : 30 da donuyor ( kapanıyor ) .
    ssh dan iptablesa restart atmadan aktif olmuyor ipler.
    iptables kurallarını
    iptables -F
    komutuyla 0 ladıgım halde kendi kendine yeniden kurallar aktif oluyor ve ertesi gün yeniden kapaniyor sunucu
    bi çok yerde araştırma yaptim ama hiçbir sonuc bulamadım bulduklarımda hiç bir sonuc vermedi. yardımlarınızı bekliyorum tşkler.
  • 22-12-2008, 20:09:31
    #2
    sunucuoptimizasyon.com
    Herhangi bir firewall kullanıyormusunuz ?
  • 22-12-2008, 20:36:54
    #3
    dedicate firmasinin kurdugu var sanirim fakat bunlar ne anlama geliyor hiçbi fikrim yok
    [root@server ~]# iptables -L -n
    Chain INPUT (policy ACCEPT)
    target prot opt source destination
    Chain FORWARD (policy ACCEPT)
    target prot opt source destination
    Chain OUTPUT (policy ACCEPT)
    target prot opt source destination
    Chain HTTP_TRAFFIC (0 references)
    target prot opt source destination
    Chain SSH_TRAFFIC (0 references)
    target prot opt source destination
    Chain TCP_TRAFFIC (0 references)
    target prot opt source destination
    Chain UDP_TRAFFIC (0 references)
    target prot opt source destination
    Chain WHITELIST (0 references)
    target prot opt source destination
    Chain acctboth (0 references)
    target prot opt source destination
    [root@server ~]# iptables -L
    Chain INPUT (policy ACCEPT)
    target prot opt source destination
    Chain FORWARD (policy ACCEPT)
    target prot opt source destination
    Chain OUTPUT (policy ACCEPT)
    target prot opt source destination
    Chain HTTP_TRAFFIC (0 references)
    target prot opt source destination
    Chain SSH_TRAFFIC (0 references)
    target prot opt source destination
    Chain TCP_TRAFFIC (0 references)
    target prot opt source destination
    Chain UDP_TRAFFIC (0 references)
    target prot opt source destination
    Chain WHITELIST (0 references)
    target prot opt source destination
    Chain acctboth (0 references)
    target prot opt source destination
    [root@server ~]# service iptables restart
    Flushing firewall rules: [ OK ]
    Setting chains to policy ACCEPT: filter [ OK ]
    Unloading iptables modules: [ OK ]
    Applying iptables firewall rules: [ OK ]
    Loading additional iptables modules: ip_conntrack_netbios_n[ OK ]
    [root@server ~]# iptables -L -n
    Chain INPUT (policy ACCEPT)
    target prot opt source destination
    DROP all -- 78.187.102.56 0.0.0.0/0
    DROP all -- 84.26.196.183 0.0.0.0/0
    DROP all -- 87.126.181.94 0.0.0.0/0
    DROP all -- 88.247.67.119 0.0.0.0/0
    DROP all -- 85.102.67.9 0.0.0.0/0
    DROP all -- 83.66.117.20 0.0.0.0/0
    WHITELIST all -- 0.0.0.0/0 0.0.0.0/0
    HTTP_TRAFFIC tcp -- 0.0.0.0/0 0.0.0.0/0 multiport ports 80
    SSH_TRAFFIC tcp -- 0.0.0.0/0 0.0.0.0/0 multiport ports 2 2
    TCP_TRAFFIC tcp -- 0.0.0.0/0 0.0.0.0/0
    UDP_TRAFFIC udp -- 0.0.0.0/0 0.0.0.0/0
    Chain FORWARD (policy ACCEPT)
    target prot opt source destination
    Chain OUTPUT (policy ACCEPT)
    target prot opt source destination
    Chain HTTP_TRAFFIC (1 references)
    target prot opt source destination
    ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 limit: avg 5/sec bu rst 5 mode srcip tcp dpt:80 state NEW
    tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 state NE W recent: SET name: DEFAULT side: source
    DROP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 recent: UPDATE seconds: 5 hit_count: 10 name: DEFAULT side: source
    Chain SSH_TRAFFIC (1 references)
    target prot opt source destination
    ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 limit: avg 5/sec bu rst 5 mode srcip tcp dpt:22 state NEW
    Chain TCP_TRAFFIC (1 references)
    target prot opt source destination
    Chain UDP_TRAFFIC (1 references)
    target prot opt source destination
    ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 limit: avg 256/sec burst 5 mode srcip state NEW
    Chain WHITELIST (1 references)
    target prot opt source destination
    [root@server ~]#