<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>On-line журнал o Linux &#187; ipset</title>
	<atom:link href="http://www.linuxjournal.su/tag/ipset/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.linuxjournal.su</link>
	<description>заметки по работе с GNU Linux Ubuntu Debian</description>
	<lastBuildDate>Wed, 26 Apr 2017 10:04:48 +0000</lastBuildDate>
	<language>ru-RU</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.8.17</generator>
	<item>
		<title>Защищаем сервер от атаки DNS Amplification с помощью fail2ban</title>
		<link>http://www.linuxjournal.su/zashhishhaem-server-ot-ataki-dns-amplification-s-pomoshhyu-fail2ban/</link>
		<comments>http://www.linuxjournal.su/zashhishhaem-server-ot-ataki-dns-amplification-s-pomoshhyu-fail2ban/#comments</comments>
		<pubDate>Mon, 06 May 2013 08:23:29 +0000</pubDate>
		<dc:creator><![CDATA[ceval]]></dc:creator>
				<category><![CDATA[Debian]]></category>
		<category><![CDATA[В помощь sysadmin'y]]></category>
		<category><![CDATA[Пакеты Debian]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[dns amplification]]></category>
		<category><![CDATA[dos]]></category>
		<category><![CDATA[Fail2ban]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[ipset]]></category>
		<category><![CDATA[Iptables]]></category>
		<category><![CDATA[linux]]></category>

		<guid isPermaLink="false">http://www.linuxjournal.su/?p=2800</guid>
		<description><![CDATA[Защищаем сервер от атаки DNS Amplification с помощью fail2ban Устанавливаем необходимый софт: sudo aptitude install fail2ban ipset logrotate Настройка fail2ban В /etc/fail2ban/jail.conf необходимо ввести следующие строки: [named-antidos] enabled = true banaction = iptables-ipset logpath = /var/log/iptables.log filter = iptables-named port = any protocol = all В /etc/fail2ban/action.d создаем файл iptables-ipset.conf со следующим содержимым: [Definition] actionstart [&#8230;]]]></description>
		<wfw:commentRss>http://www.linuxjournal.su/zashhishhaem-server-ot-ataki-dns-amplification-s-pomoshhyu-fail2ban/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
