I'm using iplog 2.1.1, and I noticed the following in my logs this
May 24 12:12:28 UDP: scan/flood detected from ns.iol.ie
May 24 12:14:16 UDP: scan/flood mode expired for ns.iol.ie - received a
total of 24 packets (816 bytes).
Now, I'm 99.999% certain that IOL are not scanning me, so presumably this
is just iplog being a little too anal in it's logging.
Does anyone have any config that I can add to my iplog.rules to tell it to
be a log a little less.
ATM, I've got it ignoring all TCP/UDP/ICMP traffic on the internal
network, and I'd prefer not to have to tell it to ignore all UDP traffic.
Should I just tell it to ignore port 53/udp traffic, which is presumably
whats coming from ns.iol.ie ?
Maintained by the ILUG website team. The aim of Linux.ie is to
support and help commercial and private users of Linux in Ireland. You can
display ILUG news in your own webpages, read backend
information to find out how. Networking services kindly provided by HEAnet, server kindly donated by
Dell. Linux is a trademark of Linus Torvalds,
used with permission. No penguins were harmed in the production or maintenance
of this highly praised website. Looking for the
Indian Linux Users' Group? Try here. If you've read all this and aren't a lawyer: you should be!