Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 27 Mar 2013 11:37:36 +1100
From:      "Daniel O'Callaghan" <danny@clari.net.au>
To:        freebsd-questions@freebsd.org
Subject:   Re: Client Authentication
Message-ID:  <51523F50.3040205@clari.net.au>
In-Reply-To: <op.wukulmoxg7njmm@michael-think>
References:  <B2DC7342-9F1A-489A-94F0-49802B1E5DF6@lafn.org> <20130326171812.GA20118@shellx.eskimo.com> <51521995.5080203@clari.net.au> <op.wukulmoxg7njmm@michael-think>

next in thread | previous in thread | raw e-mail | index | archive | help
On 27/03/2013 10:37 AM, Michael Ross wrote:
>> I'm happy to share a program I wrote which slows down the brute force 
>> attackers.
>> It simply counts the SYN packets from a given IP and limits the rate 
>> per minute by dropping the packet if they are coming too fast.
>>
>> Uses ipfw divert sockets, so would work if you prefer ipfw over pf.
>
> Me Me Me! ...ahem.
> I do prefer IPFW over PF and would very much like to try it out,
> so please do share. 
OK, here 'tis

https://secure.clari.net.au/ratelimit2.tgz

Danny



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?51523F50.3040205>