Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 27 Mar 2013 00:37:59 +0100
From:      "Michael Ross" <gmx@ross.cx>
To:        freebsd-questions@freebsd.org, "Daniel O'Callaghan" <danny@clari.net.au>
Subject:   Re: Client Authentication
Message-ID:  <op.wukulmoxg7njmm@michael-think>
In-Reply-To: <51521995.5080203@clari.net.au>
References:  <B2DC7342-9F1A-489A-94F0-49802B1E5DF6@lafn.org> <20130326171812.GA20118@shellx.eskimo.com> <51521995.5080203@clari.net.au>

Next in thread | Previous in thread | Raw E-Mail | Index | Archive | Help
On Tue, 26 Mar 2013 22:56:37 +0100, Daniel O'Callaghan  
<danny@clari.net.au> wrote:

> On 27/03/2013 4:18 AM, Joseph Olatt wrote:
>>> Any ideas/suggestions on this will be appreciated.  Thanks,
>>> >
>>> >-- Doug
>> A little while back I wrote a system to do a simple Two Factor
>> Authentication and dynamic manipulation of PF (Packet Filter) Tables. I
>> created it to prevent brute-force attacks on the servers that I have
>> exposed on the Internet.
> I'm happy to share a program I wrote which slows down the brute force  
> attackers.
> It simply counts the SYN packets from a given IP and limits the rate per  
> minute by dropping the packet if they are coming too fast.
>
> Uses ipfw divert sockets, so would work if you prefer ipfw over pf.

Me Me Me! ...ahem.
I do prefer IPFW over PF and would very much like to try it out,
so please do share.

Regards,

Michael



Want to link to this message? Use this URL: <http://docs.FreeBSD.org/cgi/mid.cgi?op.wukulmoxg7njmm>