Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 11 Apr 2006 10:58:48 +0200
From:      Matteo 'egon' Baldi <ml@egonflower.com>
To:        freebsd-stable@freebsd.org
Subject:   bruteforce
Message-ID:  <443B6FC8.8080503@egonflower.com>

next in thread | raw e-mail | index | archive | help
Hy, I'm triing to find a solution to bruteforce attack, mostly on port 
22, without moving services on different ports.
I've try something similar to this:

table <ssh-bruteforce> persist
block in quick from <ssh-bruteforce>

pass in on $ext_if proto tcp from any to ($ext_if) port ssh \
        flags S/SA keep state \
        (max-src-conn-rate 3/30, overload <ssh-bruteforce> flush global

 
block drop in quick on $ext_if from <ssh-bruteforce>

but i get:

gate# pfctl -f /etc/pf.conf
/etc/pf.conf:48: illegal timeout name max-src-conn-rate
pfctl: Syntax error in config file: pf rules not loaded


where do I go wrong??
egon.


---------------------------
kernel options:
# PF Support
options         IPSEC
device          pf
device          pflog
device          pfsync
options         QUOTA

#ALTQ Support
options         ALTQ
options         ALTQ_CBQ
options         ALTQ_RED
options         ALTQ_RIO
options         ALTQ_HFSC
options         ALTQ_CDNR
options         ALTQ_PRIQ
------------------------------------



-- 
-----------------------------------------------------------------------------------------------
You are not your job.
You're not how much money you have in the bank.
You're not the car you drive.
You're not the contents of your wallet.
You're not your fucking khakis.
You are the all-singing, all-dancing crap of the world...
----------------------------------------------------------------------------------------------
http://www.015-bsd.org
info@015-bsd.org
-----------------------------------------------------------------------------------------------




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?443B6FC8.8080503>