graphene-os-server-infrastr.../nftables
Daniel Micay 398acc6fe8 nftables: drop instead of reject for unused ports
This provides consistency with DDoS protection services placed in front
of the services rather than the behavior changing based on whether DDoS
protection is active. This doesn't help with protecting against attacks
since they'll almost always be targeting ports with services active or
exhausting inbound bandwidth via UDP reflection attacks. This appears to
be the standard approach used by most large tech companies.
2024-04-19 13:54:12 -04:00
..
nftables-attestation.conf nftables: drop instead of reject for unused ports 2024-04-19 13:54:12 -04:00
nftables-discuss.conf nftables: drop instead of reject for unused ports 2024-04-19 13:54:12 -04:00
nftables-mail.conf nftables: drop instead of reject for unused ports 2024-04-19 13:54:12 -04:00
nftables-matrix.conf nftables: drop instead of reject for unused ports 2024-04-19 13:54:12 -04:00
nftables-network.conf nftables: drop instead of reject for unused ports 2024-04-19 13:54:12 -04:00
nftables-ns1.conf nftables: drop instead of reject for unused ports 2024-04-19 13:54:12 -04:00
nftables-ns2.conf nftables: drop instead of reject for unused ports 2024-04-19 13:54:12 -04:00
nftables-social.conf nftables: drop instead of reject for unused ports 2024-04-19 13:54:12 -04:00
nftables-web.conf nftables: drop instead of reject for unused ports 2024-04-19 13:54:12 -04:00