From owner-freebsd-ipfw Thu Apr 25 14:17: 9 2002 Delivered-To: freebsd-ipfw@freebsd.org Received: from horsey.gshapiro.net (horsey.gshapiro.net [209.220.147.178]) by hub.freebsd.org (Postfix) with ESMTP id C1D8137B427 for ; Thu, 25 Apr 2002 14:15:59 -0700 (PDT) Received: from horsey.gshapiro.net (gshapiro@localhost [IPv6:::1]) by horsey.gshapiro.net (8.12.3/8.12.3) with ESMTP id g3PLFxA2067870 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO); Thu, 25 Apr 2002 14:15:59 -0700 (PDT) Received: (from gshapiro@localhost) by horsey.gshapiro.net (8.12.3/8.12.3/Submit) id g3PLFwC1067867; Thu, 25 Apr 2002 14:15:58 -0700 (PDT) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-ID: <15560.29198.657946.738003@horsey.gshapiro.net> Date: Thu, 25 Apr 2002 14:15:58 -0700 From: Gregory Neil Shapiro To: "Rex A. Roof" Cc: freebsd-ipfw@FreeBSD.ORG Subject: Re: Putting in place an incoming sendmail limit In-Reply-To: <200204252052.g3PKqrj0090391@gunjin.wccnet.org> References: <200204252052.g3PKqrj0090391@gunjin.wccnet.org> X-Mailer: VM 7.00 under 21.1 (patch 14) "Cuyahoga Valley" XEmacs Lucid Sender: owner-freebsd-ipfw@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG rex> In order to prevent incoming DoS attacks via multiple sendmail rex> connections, I've tried adding the following ipfw rule: rex> allow tcp from any to any smtp limit src-addr 1 rex> This works great, except that when it's triggered I get A LOT rex> of messages like this: rex> OUCH! cannot remove rule, count 1 rex> drop session, too many entries Perhaps it is because that rule matches every packet into of just the TCP setup packet. You might try using the 'setup' keyword. (Just a guess). To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ipfw" in the body of the message