Date: Fri, 08 Apr 2005 12:07:11 -0700 From: Michael Carlson <carlson39@llnl.gov> To: freebsd-security@freebsd.org Subject: Re: What is this Very Stupid DOS Attack Script? Message-ID: <6.1.2.0.2.20050408120501.103c99c8@mail.llnl.gov> In-Reply-To: <4255D022.9040205@nsu.nova.edu> References: <200504061549.j36Fn8Y5082507@dc.cis.okstate.edu> <425406ED.5060400@withagen.nl> <4100.212.12.51.89.1112804356.squirrel@212.12.51.89> <4255D022.9040205@nsu.nova.edu>
next in thread | previous in thread | raw e-mail | index | archive | help
I would be very interested in a script/setup like this, so I second the suggestion of posting it somewhere. On a minor off topic question, has anyone gotten the linux-pam/pam_tally to work in 5.x? Due to security requirements at work I need either that or something similar. At 05:28 PM 4/7/2005, Jon Adams wrote: >Marian Hettwer wrote: > >>On Mi, 6.04.2005, 17:57, Willem Jan Withagen sagte: >> >> >>>I've build some swatch-rules that after two of these hits, I dump >>>the host into ifpw-deny space. >>> >>> >>Aye. I thought about writing a script, doing the same like yours, too. >>Could you post this script somewhere, so that I could add some >>functionality or just use it ? >> >> >This is similar to what I do... except > >I just run a cronjob every so often... daily.. weekly.. what have you.. >that will restart ipfw... probably there is a cleaner solution, but it >does the job for me.... as far as cleaning out the dozens of IPs that get >blocked for connecting to ports they shouldnt on my boxes > >_______________________________________________ >freebsd-security@freebsd.org mailing list >http://lists.freebsd.org/mailman/listinfo/freebsd-security >To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?6.1.2.0.2.20050408120501.103c99c8>