@@ -147,6 +147,12 @@ Connection states separated by colon operator (:) to block. See:
147147.B ss(1).
148148(Default: "connected")
149149
150+ .TP
151+ .B CONN_STATES_NS = '<valid netstat states>'
152+ Connection states to block separated by pipe operator when using netstat. See:
153+ .B netstat(1).
154+ (Default: "ESTABLISHED|SYN_SENT|SYN_RECV|FIN_WAIT1|FIN_WAIT2|TIME_WAIT|CLOSE_WAIT|LAST_ACK|CLOSING")
155+
150156.TP
151157.B ONLY_INCOMING = <false|true>
152158Only count incoming connections to listening services, which will
@@ -157,15 +163,22 @@ a single ip address. Slower than default in/out method.
157163.TP
158164.B ENABLE_PORTS = <false|true>
159165This option enables the usage of PORT_CONNECTIONS and overrides the
160- ONLY_INCOMING option. Slower than ONLY_INCOMING method.
166+ ONLY_INCOMING option. Same as ONLY_INCOMING but you can also assing
167+ blocking rules per port using PORT_CONNECTIONS. Slower than
168+ ONLY_INCOMING method.
161169(Default: false)
162170
163171.TP
164172.B PORT_CONNECTIONS = '<from_port[-to_port]>:<max_conn>:<ban_period> ...'
165173Maximum amount of connections per port before blocking. If a user
166174is making all its connections to a single port the max connections
167- specified for the port will take precedence over the global amount of
168- NO_OF_CONNECTIONS value. Example: "80:150:600 443:150:600 20-21:250:600"
175+ specified for the port will take precedence over the
176+ NO_OF_CONNECTIONS value.
177+ You should specify a rule for all the service ports your server is
178+ running since those ports not defined on this list will be ignored
179+ when ENABLE_PORTS is enabled, making those ports not listed on this
180+ configuration flag vulnerable to attacks. Example:
181+ "80:150:600 443:150:600 20-21:250:600"
169182
170183.SH FILES
171184.B /usr/local/ddos/LICENSE
0 commit comments