[nos-bbs] Jnos memory leak with forwarding
g.ponza at tin.it
Fri Oct 20 13:55:09 EDT 2017
> Where as if you simply use tun/tap and have your kernel act as a 44/8
> router then fail2ban would be effective since the packet paths would go:
> inet cloud <--> CPE/Router|DMZ <--> Linux Kernel|fail2ban <--> JNOS
> Of course, if you're really crafty you can write your own rules that can
> accomplish the same goal as fail2ban.
That one is my case: routing 44net on the linux kernel (since I had
no chance to get ampr.gw routes on both JNOS and LinBPQ system);
and all inboud/outbound from/to linux/internet by using the tun0
However in the past 20 hours to now I had the following visitors:
tax.gov. 12256 IN SOA ns1.irs.gov.
it.aciouns.external.dns.admin.irs.gov. 2333 7200 1800
. 0 IN SOA a.root-servers.net. nstld.verisign-grs.com.
2017101901 1800 900 604800 86400
but no JONS faiure :)
More information about the nos-bbs