mmgRay
12-02-2010, 17:10
Yup yup, thanks for all your help!
nameserver 213.186.33.99
This might be because you have specified the localhost/127.0.0.1 in /etc/resolv.conf or elsewhere for DNS lookups; if you are not running your own DNS server, then you should consider changing that as it could add unnecessary delays and slow down several applications (SSH being one of them).
Feb 9 10:36:55 host kernel: iptables-input-drop:IN=eth0 OUT= PHYSIN=eth0 MAC=00:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx SRC=123.11.22.33 DST=91.22.33.44 LEN=60 TOS=0x00 PREC=0x00 TTL=52 ID=39014 DF PROTO=TCP SPT=36670 DPT=80 WINDOW=5840 RES=0x00 SYN URGP=0
-A INPUT -j LOG --log-prefix "iptables-input-drop:" --log-level 6
*filter -N SSHCHAIN -N ALLOWEDIPS # For testing -A INPUT -s 94.23.63.114 -j ACCEPT -A INPUT -s **censored** -j ACCEPT # ping # -A INPUT -p icmp -m icmp -d 94.23.200.210 -j ACCEPT -A INPUT -i eth0 -p icmp --source proxy.ovh.net -j ACCEPT -A INPUT -i eth0 -p icmp --source proxy.p19.ovh.net -j ACCEPT -A INPUT -i eth0 -p icmp --source proxy.rbx.ovh.net -j ACCEPT -A INPUT -i eth0 -p icmp --source ping.ovh.net -j ACCEPT -A INPUT -i eth0 -p icmp --source 94.23.200.250 -j ACCEPT # accept established connections -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT # blocks syn flood # -A INPUT -p tcp --syn -m limit --limit 10/second -j ACCEPT -A INPUT -p tcp -m tcp --dport 22 -j SSHCHAIN -A INPUT -p udp -m udp --dport 22 -j SSHCHAIN -A SSHCHAIN -s cache.ovh.net -j ACCEPT -A SSHCHAIN -d **censored** -j ALLOWEDIPS -A SSHCHAIN -j DROP # httpd -A INPUT -p tcp -m tcp --dport 80 -d 94.23.200.210 -j ACCEPT -A INPUT -p tcp -m tcp --dport 443 -d 94.23.200.210 -j ACCEPT -A INPUT -p tcp -m tcp --dport 7080 -**censored** -j ALLOWEDIPS -A INPUT -p tcp -m tcp --dport 443 -d **censored** -j ALLOWEDIPS # email -A INPUT -p tcp -m tcp --dport 143 -j ACCEPT -A INPUT -p tcp -m tcp --dport 110 -j ACCEPT -A INPUT -p tcp -m tcp --dport 995 -j ACCEPT -A INPUT -p tcp -m tcp --dport 993 -j ACCEPT -A INPUT -p tcp -m tcp --dport 25 -j ACCEPT # sa-mp -A INPUT -p tcp -m tcp --dport 7777:7778 -d 94.23.200.210 -j ACCEPT -A INPUT -p udp -m udp --dport 7777:7778 -d 94.23.200.210 -j ACCEPT # vco -A INPUT -p tcp -m tcp --dport 4800 -d 94.23.200.210 -j ACCEPT -A INPUT -p udp -m udp --dport 4800 -d 94.23.200.210 -j ACCEPT # COD4 -A INPUT -p tcp -m tcp --dport 28960 -d 94.23.200.210 -j ACCEPT -A INPUT -p udp -m udp --dport 28960 -d 94.23.200.210 -j ACCEPT # COD2 -A INPUT -p tcp -m tcp --dport 28961 -d 94.23.200.210 -j ACCEPT -A INPUT -p udp -m udp --dport 28961 -d 94.23.200.210 -j ACCEPT # vent -A INPUT -p tcp -m tcp --dport 3784 -d 94.23.200.210 -j ACCEPT -A INPUT -p udp -m udp --dport 3784 -d 94.23.200.210 -j ACCEPT -A ALLOWEDIPS -s **censored** -j ACCEPT -A ALLOWEDIPS -j DROP # drop all else -A INPUT -j DROP # dont allow new output connections, unless to ourselves -A OUTPUT -s 127.0.0.1 -d 127.0.0.1 -j ACCEPT -A OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPT # Apps might need these sometimes -A OUTPUT -p udp --dport 53 -j ACCEPT -A OUTPUT -p tcp --dport 53 -j ACCEPT -A OUTPUT -p tcp --dport 80 -j ACCEPT -A OUTPUT -p tcp --dport 21 -j ACCEPT # email -A OUTPUT -p tcp -m tcp --dport 143 -j ACCEPT -A OUTPUT -p tcp -m tcp --dport 110 -j ACCEPT -A OUTPUT -p tcp -m tcp --dport 995 -j ACCEPT -A OUTPUT -p tcp -m tcp --dport 993 -j ACCEPT -A OUTPUT -p tcp -m tcp --dport 25 -j ACCEPT -A OUTPUT -j ACCEPT # dont allow forwarding -A FORWARD -j DROP COMMIT *nat COMMIT