How to block Heartbleed queries with IPtables

Here are some rules to block HeartBleed queries with IPtables. The example focuses on HTTPS (port 443). By copying the rules and changing the destination port (“--dport xxx“) you can protect other services too.

If you want the queries logged then first add this rule.

And the actual rule which drops the Heartbleed queries:

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.