From 32479825d4ad94867a6b5030d6a943d5d1806ea8 Mon Sep 17 00:00:00 2001 From: Chipmunk <65827213+chipmunkmc@users.noreply.github.com> Date: Tue, 17 Jan 2023 16:31:44 -0500 Subject: [PATCH] No more connection limits Might revert if this gets abused too much, but bypassing it with open proxies is easy, and most skiddies use services (that use proxies) for their spambotting anyway. In my opinion, this causes more problems than it prevents. --- config/iptables | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/config/iptables b/config/iptables index 0c8b7e6..d07e50d 100644 --- a/config/iptables +++ b/config/iptables @@ -1,11 +1,11 @@ # IPv4 iptables -t nat -A INPUT -p tcp --dport 25565 -j SNAT --to-source 192.168.1.0-192.168.100.100 iptables -t nat -A INPUT -p udp --dport 19132 -j SNAT --to-source 192.168.1.0-192.168.100.100 -iptables -A INPUT -p tcp --syn --dport 25565 -m connlimit --connlimit-above 5 --connlimit-mask 32 -j REJECT --reject-with tcp-reset +tcp-reset iptables-save > /etc/iptables/rules.v4 # IPv6 ip6tables -t nat -A INPUT -p tcp --dport 25565 -j SNAT --to-source 2001:db8::1-2001:db8::6464 ip6tables -t nat -A INPUT -p udp --dport 19132 -j SNAT --to-source 2001:db8::1-2001:db8::6464 -ip6tables -A INPUT -p tcp --syn --dport 25565 -m connlimit --connlimit-above 5 --connlimit-mask 64 -j REJECT --reject-with tcp-reset +tcp-reset ip6tables-save > /etc/iptables/rules.v6