How are my iptables rules circumvented?
I’m using ufw on a debian server and apparently an attacker is able to circumvent the filtering rules. ufw uses iptables.
The server host http and mail services, and has an ssh port. I use a non-standard port for my ssh and… Continue reading How are my iptables rules circumvented?