Date: Tue, 17 Nov 2009 12:48:04 +0200 From: "Sergey V. Dyatko" <sergey.dyatko@gmail.com> To: freebsd-pf@FreeBSD.org Subject: pf and max-src-conn-rate Message-ID: <20091117124804.08d70a8e@notebook>
next in thread | raw e-mail | index | archive | help
Hi list,
I'm trying to stop ssh bruteforce on my box (rules bellow), but it
doesn't work. looks like 1sec interval is too small:(
from auth.log:
...
Nov 17 13:32:14 master-db6 sshd[3902]: Invalid user cobert from
200.27.164.214
Nov 17 13:32:14 master-db6 sshd[3902]: error: PAM: authentication error
for illegal user cobert from server.aconex.cl
Nov 17 13:32:14 master-db6 sshd[3902]: Failed keyboard-interactive/pam
for invalid user cobert from 200.27.164.214 port 57587 ssh2
...
Nov 17 13:40:17 master-db6 sshd[3961]: error: PAM: authentication error
for illegal user colman from 80.243.172.54
Nov 17 13:40:17 master-db6 sshd[3961]: Failed keyboard-interactive/pam
for invalid user colman from 80.243.172.54 port 45081 ssh2
...
As you can see I got 2 connections from 1 ip in 1 second but...
#pfctl -tbots -Tshow|wc -l
0
where i'm wrong?
pf.conf:
ext_if="em0"
table <trusted_hosts> { my_net/24, some_ip/32}
table <bots> persist
scrub in all
pass in quick on $ext_if proto tcp from <trusted_hosts>
block in quick from <bots>
pass in quick on $ext_if proto tcp to $ext_if port ssh \
flags S/SA keep state \
( max-src-conn-rate 2/1 overload <bots> flush )
pass in all
pass out all
--
wbr, tiger
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20091117124804.08d70a8e>
