Date: Tue, 11 Apr 2006 10:58:48 +0200 From: Matteo 'egon' Baldi <ml@egonflower.com> To: freebsd-stable@freebsd.org Subject: bruteforce Message-ID: <443B6FC8.8080503@egonflower.com>
next in thread | raw e-mail | index | archive | help
Hy, I'm triing to find a solution to bruteforce attack, mostly on port 22, without moving services on different ports. I've try something similar to this: table <ssh-bruteforce> persist block in quick from <ssh-bruteforce> pass in on $ext_if proto tcp from any to ($ext_if) port ssh \ flags S/SA keep state \ (max-src-conn-rate 3/30, overload <ssh-bruteforce> flush global block drop in quick on $ext_if from <ssh-bruteforce> but i get: gate# pfctl -f /etc/pf.conf /etc/pf.conf:48: illegal timeout name max-src-conn-rate pfctl: Syntax error in config file: pf rules not loaded where do I go wrong?? egon. --------------------------- kernel options: # PF Support options IPSEC device pf device pflog device pfsync options QUOTA #ALTQ Support options ALTQ options ALTQ_CBQ options ALTQ_RED options ALTQ_RIO options ALTQ_HFSC options ALTQ_CDNR options ALTQ_PRIQ ------------------------------------ -- ----------------------------------------------------------------------------------------------- You are not your job. You're not how much money you have in the bank. You're not the car you drive. You're not the contents of your wallet. You're not your fucking khakis. You are the all-singing, all-dancing crap of the world... ---------------------------------------------------------------------------------------------- http://www.015-bsd.org info@015-bsd.org -----------------------------------------------------------------------------------------------
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?443B6FC8.8080503>