Date: Wed, 27 Mar 2013 02:59:06 +0100 From: "Michael Ross" <gmx@ross.cx> To: freebsd-questions@freebsd.org, "Daniel O'Callaghan" <danny@clari.net.au> Subject: Re: Client Authentication Message-ID: <op.wuk04sadg7njmm@michael-think> In-Reply-To: <51523F50.3040205@clari.net.au> References: <B2DC7342-9F1A-489A-94F0-49802B1E5DF6@lafn.org> <20130326171812.GA20118@shellx.eskimo.com> <51521995.5080203@clari.net.au> <op.wukulmoxg7njmm@michael-think> <51523F50.3040205@clari.net.au>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 27 Mar 2013 01:37:36 +0100, Daniel O'Callaghan <danny@clari.net.au> wrote: > On 27/03/2013 10:37 AM, Michael Ross wrote: >>> I'm happy to share a program I wrote which slows down the brute force >>> attackers. >>> It simply counts the SYN packets from a given IP and limits the rate >>> per minute by dropping the packet if they are coming too fast. >>> >>> Uses ipfw divert sockets, so would work if you prefer ipfw over pf. >> >> Me Me Me! ...ahem. >> I do prefer IPFW over PF and would very much like to try it out, >> so please do share. > OK, here 'tis > > https://secure.clari.net.au/ratelimit2.tgz > > Danny Thanks! I'd like to be able to change the time window: http://gurder.ross.cx/misc/ratelimit.patch Regards, Michael
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?op.wuk04sadg7njmm>