Date: Thu, 25 Apr 2002 14:15:58 -0700 From: Gregory Neil Shapiro <gshapiro@FreeBSD.ORG> To: "Rex A. Roof" <rex@gunjin.wccnet.org> Cc: freebsd-ipfw@FreeBSD.ORG Subject: Re: Putting in place an incoming sendmail limit Message-ID: <15560.29198.657946.738003@horsey.gshapiro.net> In-Reply-To: <200204252052.g3PKqrj0090391@gunjin.wccnet.org> References: <200204252052.g3PKqrj0090391@gunjin.wccnet.org>
next in thread | previous in thread | raw e-mail | index | archive | help
rex> In order to prevent incoming DoS attacks via multiple sendmail rex> connections, I've tried adding the following ipfw rule: rex> allow tcp from any to any smtp limit src-addr 1 rex> This works great, except that when it's triggered I get A LOT rex> of messages like this: rex> OUCH! cannot remove rule, count 1 rex> drop session, too many entries Perhaps it is because that rule matches every packet into of just the TCP setup packet. You might try using the 'setup' keyword. (Just a guess). To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ipfw" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?15560.29198.657946.738003>