Date: Tue, 30 Sep 2008 10:16:37 +0200 From: Ollivier Robert <roberto@keltia.freenix.fr> To: freebsd-hackers@freebsd.org Subject: Re: SSH Brute Force attempts Message-ID: <20080930081637.GA34744@keltia.freenix.fr> In-Reply-To: <200809291939.41533.rhavenn@rhavenn.net> References: <48E16E93.3090601@gmail.com> <200809291939.41533.rhavenn@rhavenn.net>
next in thread | previous in thread | raw e-mail | index | archive | help
According to Henrik Hudson:
> Yeap, -security
>
> However, also try this in pf.conf (specific rules related to this; you'll need
> more for a real pf.conf):
>
> table <badguys> { } persist
> block in quick from <badguys>
> pass in on $ext_if proto tcp from any to ($ext_if) port ssh keep state
> (max-src-conn 5, max-src-conn-rate 4/300, overload <badguys> flush global)
That one is very effective.
--
Ollivier ROBERT -=- FreeBSD: The Power to Serve! -=- roberto@keltia.freenix.fr
Darwin sidhe.keltia.net Version 9.4.0: Mon Jun 9 19:30:53 PDT 2008; i386
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20080930081637.GA34744>
