Date: Thu, 28 Sep 2006 14:23:51 -0400 From: John Baldwin <jhb@freebsd.org> To: Thierry Thomas <thierry@freebsd.org> Cc: freebsd-chat@freebsd.org Subject: Re: Party Message-ID: <200609281423.52065.jhb@freebsd.org> In-Reply-To: <20060928151429.GP1654@graf.pompo.net> References: <20060920104047.GA49442@splork.wirewater.yow> <200609281019.42614.jhb@freebsd.org> <20060928151429.GP1654@graf.pompo.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thursday 28 September 2006 11:14, Thierry Thomas wrote: > Le Jeu 28 sep 06 à 16:19:42 +0200, John Baldwin <jhb@freebsd.org> > écrivait : > > > ports/security/bruteblock (there's another one for pf, this one is for ipfw) > > No need for an external tool with pf. Just add this kind of rule: > > table <ssh-bruteforce> persist > block in quick from <ssh-bruteforce> > pass in quick on $ext_if inet proto tcp from any to ($ext_if) \ > port 22 flags S/SA keep state \ > ( max-src-conn-rate 2/10, overload <ssh-bruteforce> flush global) Depends. I only want to block bad connections. I don't want to lock myself out if I happen to open too many ssh session terminals at work. :) -- John Baldwin
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200609281423.52065.jhb>
