Hy, I'm triing to find a solution to bruteforce attack, mostly on port 
22, without moving services on different ports.
I've try something similar to this:
table <ssh-bruteforce> persist
block in quick from <ssh-bruteforce>
pass in on $ext_if proto tcp from any to ($ext_if) port ssh \
        flags S/SA keep state \
        (max-src-conn-rate 3/30, overload <ssh-bruteforce> flush global
 
block drop in quick on $ext_if from <ssh-bruteforce>
but i get:
gate# pfctl -f /etc/pf.conf
/etc/pf.conf:48: illegal timeout name max-src-conn-rate
pfctl: Syntax error in config file: pf rules not loaded
where do I go wrong??
egon.
---------------------------
kernel options:
# PF Support
options         IPSEC
device          pf
device          pflog
device          pfsync
options         QUOTA
#ALTQ Support
options         ALTQ
options         ALTQ_CBQ
options         ALTQ_RED
options         ALTQ_RIO
options         ALTQ_HFSC
options         ALTQ_CDNR
options         ALTQ_PRIQ
------------------------------------
-- 
-----------------------------------------------------------------------------------------------
You are not your job.
You're not how much money you have in the bank.
You're not the car you drive.
You're not the contents of your wallet.
You're not your fucking khakis.
You are the all-singing, all-dancing crap of the world...
----------------------------------------------------------------------------------------------
http://www.015-bsd.org
info@015-bsd.org
-----------------------------------------------------------------------------------------------
On Tuesday 11 April 2006 18:28, Matteo 'egon' Baldi wrote:> gate# pfctl -f /etc/pf.conf > /etc/pf.conf:48: illegal timeout name max-src-conn-rate > pfctl: Syntax error in config file: pf rules not loadedYour version of FreeBSD is too old and has a version of pf that pre-dates this feature. I suggest an upgrade to RELENG_6 or wait until 6.1 comes out. PS here is a page with how I do it.. http://www.gsoft.com.au/~doconnor/brute-force-mitigation.html (With a script to expire IPs from the table) -- Daniel O'Connor software and network engineer for Genesis Software - http://www.gsoft.com.au "The nice thing about standards is that there are so many of them to choose from." -- Andrew Tanenbaum GPG Fingerprint - 5596 B766 97C0 0E94 4347 295E E593 DC20 7B3F CE8C -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: not available Url : http://lists.freebsd.org/pipermail/freebsd-stable/attachments/20060411/9cb93b02/attachment.pgp
On Tue, Apr 11, 2006 at 10:58:48AM +0200, Matteo 'egon' Baldi wrote:> Hy, I'm triing to find a solution to bruteforce attack, mostly on port 22, without > moving services on different ports.try to use /usr/ports/security/sshit By. Dmitriy