Date: Fri, 18 Jun 2010 18:49:42 +0200 From: Matthias Fechner <idefix@fechner.net> To: freebsd-questions@freebsd.org Subject: Re: system is under attack (what can I do more?) Message-ID: <4C1BA3A6.1090509@fechner.net> In-Reply-To: <20100618155514.GI29381@omniti.com> References: <367428.93212.qm@web51108.mail.re2.yahoo.com> <4C1B67B2.8000309@nrdx.com> <4C1B90CE.4020509@netscape.net> <4C1B9549.4080801@gmail.com> <20100618155514.GI29381@omniti.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Am 18.06.10 17:55, schrieb Jason Dixon: > Doesn't FreeBSD's version of pf support the overload feature? This is > how we typically manage ssh bruteforce attempts in OpenBSD/pf-land. > and what you want to do if a user connects authorizied very often in lets say 10 seconds? If you work e.g. with subversion or other tunneled connection 10 connections in 5 seconds is not seldom. On pf-level you are not able to distinquish between successfull or denied connection or? Bye, Matthias -- "Programming today is a race between software engineers striving to build bigger and better idiot-proof programs, and the universe trying to produce bigger and better idiots. So far, the universe is winning." -- Rich Cook
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4C1BA3A6.1090509>