sory nieko asmeniško, bet man kai nelabai susigaudančiam tuose visuose scriptuose tai labai baisu leist bile ką, ypač kai rašo kad reikia :) čia maždaug kaip kažkada klajojo eilutė su kodu kur pagamindavo "rm -rf /" On 2014.09.29 07:21, Vidas Makauskas wrote: > 2013-11-18 15:00, Rrr rašė: >> Dropini viska, atidarai tik reikiamus portus [iptables]. Prie SSH ir kitu svarbiu portu leidi tik >> tam tikrus ip, pvz darbo, namu, savo 3g mobileko interneto subnet'us [iptables]. SSH isjjungi >> prisijungima rootui ir is viso neleidi jungtis su passwordu, leidi tik paprastiem useriam ir tik >> savo su cert'u (ant cert turi buti uzdetas pass), kuri pvz nesiojiesi flashiuke [sshd]. Kaip jau >> kazkas minejo, naudoji fail2ban (principas - pats nurodai kiek leidi prisijungimu per tam tikra >> laiko tarpa i tam tikra porta/servisa, pvz 3 prisijungimai per 1 min., ant 4 blokuojamas konkretus >> IP nustatytam laikui ir kiti panasus navarotai). >> >> >> >> >> "Drambliukas" <nera@nera.lt> wrote in message news:l5beek$c0r$1@trimpas.omnitel.net... >>> Sveiki, Fedora (Leonidas), routeris, mailserveris, adresas statinis, >>> >>> Pasipyle loguose IP adresai, kurie bando arba skanuoti root, ssh >>> slaptazodzius arba listi i info@epasta dezute, kuria ismetus fiziskai - vis >>> viena bando skanuot. >>> Kokie aplamai veiksmai tokiu atveju. Kaip kol kas bandau sukovot irasydamas >>> tuos IP adresus i /etc/hosts.deny faila. Bet panasu, kad kova su vejo >>> malunais nes anie pasikeicia IP adresa ir net is kito zemyno. >>> Butu malonu suzinot kaip kovoti >>> >>> > To all Linux users, be aware of the newly uncovered critical vulnerability named Shellshock > (CVE-2014-6271 and CVE-2014-7169). This really is in the same league with recent Heartbleed > vulnerability, and some people are considering it even a bigger deal. In short, the vulnerability > allows attacker to execute arbitrary code on any web server with bash installed (which makes it > 99.9% Linux-based web servers, pretty much). What is really scary is that this bug existed in all > bash versions, including one from 25 years ago. So patch immediately because hackers are already > using it. Here is a command to help you confirm if a system is vulnerable against the Shellshock > vulnerability. If this outputs a line containing only the word "vulnerable", then you are using a > vulnerable version of Bash. > $ env 'x=() { :;}; echo vulnerable' 'BASH_FUNC_x()=() { :;}; echo vulnerable' bash -c "echo test"