From owner-freebsd-security@FreeBSD.ORG Mon Dec 19 21:28:21 2005 Return-Path: X-Original-To: freebsd-security@freebsd.org Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 0D6C416A41F for ; Mon, 19 Dec 2005 21:28:21 +0000 (GMT) (envelope-from MH@kernel32.de) Received: from crivens.unixoid.de (crivens.unixoid.de [81.169.171.191]) by mx1.FreeBSD.org (Postfix) with ESMTP id 5F70E43D5D for ; Mon, 19 Dec 2005 21:28:20 +0000 (GMT) (envelope-from MH@kernel32.de) Received: from localhost (localhost [127.0.0.1]) by crivens.unixoid.de (Postfix) with ESMTP id 4506F413A; Mon, 19 Dec 2005 22:28:18 +0100 (CET) Received: from crivens.unixoid.de ([127.0.0.1]) by localhost (crivens.unixoid.de [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 65535-07; Mon, 19 Dec 2005 22:28:14 +0100 (CET) Received: from [85.178.84.52] (e178084052.adsl.alicedsl.de [85.178.84.52]) by crivens.unixoid.de (Postfix) with ESMTP id AF26F4132; Mon, 19 Dec 2005 22:28:14 +0100 (CET) Message-ID: <43A725ED.5090502@kernel32.de> Date: Mon, 19 Dec 2005 22:28:13 +0100 From: Marian Hettwer User-Agent: Mozilla Thunderbird 1.0.2 (Macintosh/20050317) X-Accept-Language: en-us, en MIME-Version: 1.0 To: Hadi Maleki References: In-Reply-To: Content-Type: text/plain; charset=ISO-8859-15; format=flowed Content-Transfer-Encoding: 7bit X-Virus-Scanned: amavisd-new at unixoid.de Cc: freebsd-security@freebsd.org Subject: Re: Brute Force Detection + Advanced Firewall Policy X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 Dec 2005 21:28:21 -0000 Hi there, Hadi Maleki wrote: > Any BFD/AFP softwares available for FreeBSD 4.10? > If you would update to a recent FreeBSD Release, you could probably use some nice pf(4) things... > Im getting flooded with ssh and ftp attempts. > I recently stumbled over quite a nice pf.conf (see man pfctl for details), which blacklists for instance ssh connections if the occur to often in a certain amount of time. For Example: # sshspammer table table persist block log quick from # sshspammer # more than 6 ssh attempts in 15 seconds will be blocked ;) pass in quick on $ext_if proto tcp to ($ext_if) port ssh $tcp_flags (max-src-conn 10, max-src-conn-rate 6/15, overload flush global) HTH, Marian