Обсуждение статьи тематического каталога: Борьба с Kazaa и прочими качальщиками (iptables limit bandwidth tcp firewall linux)Ссылка на текст статьи: https://www.opennet.ru/base/net/packet_limit.txt.html
There is a tool called ipp2p to identify P2P traffic. It introduces a new
match module to iptables and allows you to catch the following P2P Networks
at the moment:
-Fast Track (KaZaA and clones)
-Gnutella
-Edonkey (Edonkey, Emule, Overnet ...)
-Direct Connect
You can download it from:
http://ilabws13.informatik.uni-leipzig.de/~mai97bwf/ipp2p.ta...
iptables -A FORWARD -tcp -m ipp2p --kazaa -j DROP
I have a problem. Then I write this line:
"iptables -A FORWARD -m string --string "X-Kazaa-" -j REJECT"
Server write my a following error:
"iptables: No chain/target/match by that name"
It look's that it's a bad syntax...
What I can do?
Please help.
Thank's.TOMy
Your kernel or iptables can't use ipp2p.
You have to compile kernel with patch from ipp2p side, then you have to compile iptables with patch from ipp2p.
http://www.ipp2p.org/