[nos-bbs] Jnos memory leak with forwarding

Gustavo Ponza g.ponza at tin.it
Fri Oct 20 13:55:09 EDT 2017

> Where as if you simply use tun/tap and have your kernel act as a 44/8
> router then fail2ban would be effective since the packet paths would go:
> inet cloud <--> CPE/Router|DMZ <--> Linux Kernel|fail2ban <--> JNOS
> Of course, if you're really crafty you can write your own rules that can
> accomplish the same goal as fail2ban.

That one is my case: routing 44net on the linux kernel (since I had
no chance to get ampr.gw routes on both JNOS and LinBPQ system);
and all inboud/outbound from/to linux/internet by using the tun0

However in the past 20 hours to now I had the following visitors:

tax.gov.    12256    IN    SOA    ns1.irs.gov. 
it.aciouns.external.dns.admin.irs.gov.    2333    7200    1800 
2419200    900
.    0    IN    SOA    a.root-servers.net. nstld.verisign-grs.com.    
2017101901    1800    900    604800 86400

but no JONS faiure :)

73, gus

More information about the nos-bbs mailing list