From owner-freebsd-questions@FreeBSD.ORG Wed Sep 20 05:45:47 2006 Return-Path: X-Original-To: freebsd-questions@freebsd.org Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 089D816A40F for ; Wed, 20 Sep 2006 05:45:47 +0000 (UTC) (envelope-from peter@bgnett.no) Received: from skapet.datadok.no (skapet.datadok.no [194.54.107.19]) by mx1.FreeBSD.org (Postfix) with ESMTP id 9124B43D46 for ; Wed, 20 Sep 2006 05:45:46 +0000 (GMT) (envelope-from peter@bgnett.no) Received: from [10.168.103.3] (helo=amidala.kakemonster.bsdly.net.bsdly.net ident=peter) by skapet.datadok.no with esmtp (Exim 4.60) (envelope-from ) id 1GPuu1-0003oj-1K for freebsd-questions@freebsd.org; Wed, 20 Sep 2006 07:45:45 +0200 To: freebsd-questions@freebsd.org References: <20060919165400.A4380@prime.gushi.org> From: peter@bgnett.no (Peter N. M. Hansteen) Date: Wed, 20 Sep 2006 07:45:43 +0200 In-Reply-To: <20060919165400.A4380@prime.gushi.org> (Dan Mahoney's message of "Tue, 19 Sep 2006 16:55:48 -0400 (EDT)") Message-ID: <878xkff5vc.fsf@amidala.kakemonster.bsdly.net> User-Agent: Gnus/5.1007 (Gnus v5.10.7) XEmacs/21.4.17 (berkeley-unix) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Subject: Re: sshd brute force attempts? X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 20 Sep 2006 05:45:47 -0000 "Dan Mahoney, System Admin" writes: > I've found a few things based on openBSD's pf, but that doesn't seem to be > the default in BSD either. Recent BSDs (all of them, FreeBSD 5.n/6.n included) have PF in the base system. 'overload' rules are fairly easy to set up, eg table persist #Then somewhere fairly early in your rule set you set up to block from the bruteforcers block quick from #And finally, your pass rule. pass inet proto tcp from any to $localnet port $tcp_services \ flags S/SA keep state \ (max-src-conn 100, max-src-conn-rate 15/5, \ overload flush global) for more detailed discussion see eg http://www.bgnett.no/~peter/pf/en/bruteforce.html -- Peter N. M. Hansteen, member of the first RFC 1149 implementation team http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/ "First, we kill all the spammers" The Usenet Bard, "Twice-forwarded tales" 20:11:56 delilah spamd[26905]: 146.151.48.74: disconnected after 36099 seconds