Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 18 Jun 2010 18:49:42 +0200
From:      Matthias Fechner <idefix@fechner.net>
To:        freebsd-questions@freebsd.org
Subject:   Re: system is under attack (what can I do more?)
Message-ID:  <4C1BA3A6.1090509@fechner.net>
In-Reply-To: <20100618155514.GI29381@omniti.com>
References:  <367428.93212.qm@web51108.mail.re2.yahoo.com>	<4C1B67B2.8000309@nrdx.com> <4C1B90CE.4020509@netscape.net>	<4C1B9549.4080801@gmail.com> <20100618155514.GI29381@omniti.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Am 18.06.10 17:55, schrieb Jason Dixon:
> Doesn't FreeBSD's version of pf support the overload feature? This is
> how we typically manage ssh bruteforce attempts in OpenBSD/pf-land.
>    

and what you want to do if a user connects authorizied very often in 
lets say 10 seconds?
If you work e.g. with subversion or other tunneled connection 10 
connections in 5 seconds is not seldom.
On pf-level you are not able to distinquish between successfull or 
denied connection or?

Bye,
Matthias

-- 
"Programming today is a race between software engineers striving to build bigger and better idiot-proof programs, and the universe trying to produce bigger and better idiots. So far, the universe is winning." -- Rich Cook




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4C1BA3A6.1090509>