Date: Fri, 18 May 2007 09:05:41 -0700 From: "Kian Mohageri" <kian.mohageri@gmail.com> To: "Abdullah Ibn Hamad Al-Marri" <almarrie@gmail.com> Cc: Volker <volker@vwsoft.com>, freebsd-pf@freebsd.org Subject: Re: Best way to decrease DDoS with pf. Message-ID: <fee88ee40705180905q1017378ak588a2919dbec328b@mail.gmail.com> In-Reply-To: <499c70c0705180656l4f601c1av45b6f9989792ccf1@mail.gmail.com> References: <464D6880.2080306@vwsoft.com> <499c70c0705180656l4f601c1av45b6f9989792ccf1@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On 5/18/07, Abdullah Ibn Hamad Al-Marri <almarrie@gmail.com> wrote: > Thank you for the tip. > > Here what I'm using which fixed the issue. > > pass in on $ext_if proto tcp from any to $ext_if port $tcp_services > flags S/SA synproxy state > pass in on $ext_if proto tcp from any to $ext_if port $tcp_services \ > flags S/SA keep state \ > (max-src-conn 30, max-src-conn-rate 30/3, \ > overload <bruteforce> flush global) > pass out proto tcp to any keep state > > Comments? The first rule won't match anything (same criteria as second rule, and last match wins with pf). On the third rule, use 'flags S/SA' unless you have a good reason not to. Kian
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?fee88ee40705180905q1017378ak588a2919dbec328b>