Displaying 5 results from an estimated 5 matches for "verbose_limit".
2005 Feb 22
1
periodic/security/550.ipfwlimit
...limit check in /etc/periodic/security takes into account only
global/default verbosity limit and does not account for a specific
logging limit set for a particular rule e.g.:
$ ipfw -a l | fgrep log
65000 *521* 41764 deny log logamount *1000* ip from any to any
$ sysctl -n net.inet.ip.fw.verbose_limit
*100*
>From security run output:
ipfw log limit reached:
65000 519 41672 deny log logamount 1000 ip from any to any
--
Andriy Gapon
2004 Nov 14
1
ipfw logging
Hi all!
After installing 5.3 I've noticed
some change in firewall logging.
Prior (on 5.2) rules gave me what
I needed: trimed to 3 of the same
connection. Every new connection
on the same rule gave new log line
up to 3. I have in kernel:
FIREWALL
FIREWALL_VERBOSE
FIREWALL_VERBOSE_LIMIT=3
Now, all connections on the same
rule are trimed to 3. Is it possib-
le on 5.3 to have all connections
logged, but no more than 3 of the
same?
Just a little annoyance... I'd
rather see what was blocked. New
is even line:
"ipfw: limit 3 reached on entry 1500"
Can I do something to ha...
2003 May 30
1
Strange startup messages
...*Handler Int
15 keepfaith RW *Handler Int
16 gifttl RW *Handler Int
100 subnets_are_local RW *Handler Int
101 fw RW Node
100 enable RW *Handler Int
101 one_pass RW *Handler Int
102 debug RW *Handler Int
103 verbose RW *Handler Int
104 verbose_limit RW *Handler Int
105 dyn_buckets RW *Handler Int
106 curr_dyn_buckets R *Handler Int
107 dyn_count R *Handler Int
108 dyn_max RW *Handler Int
109 static_count R *Handler Int
110 dyn_ack_lifetime RW *Handler Int
111 dyn_syn_lifetime RW *Handl...
2005 Feb 23
0
Fw-up: Re: periodic/security/550.ipfwlimit - diff for RELENG-5]
...>8==============================================================================================
--- 550.ipfwlimit Wed Feb 23 18:54:35 2005
+++ 550.ipfwlimit.new Wed Feb 23 19:19:19 2005
@@ -45,10 +45,10 @@
TMP=`mktemp -t security`
IPFW_LOG_LIMIT=`sysctl -n net.inet.ip.fw.verbose_limit 2> /dev/null`
if [ $? -eq 0 ] && [ "${IPFW_LOG_LIMIT}" -ne 0 ]; then
- ipfw -a l | grep " log " | \
- grep '^[[:digit:]]\+[[:space:]]\+[[:digit:]]\+' | \
- awk -v limit="$IPFW_LOG_LIMIT" \
- '{i...
2004 Sep 18
8
Attacks on ssh port
Hi,
Is there a security problem with ssh that I've missed???
Ik keep getting these hords of:
Failed password for root from 69.242.5.195 port 39239 ssh2
with all kinds of different source addresses.
They have a shot or 15 and then they are of again, but a little later on
they're back and keep clogging my logs.
Is there a "easy" way of getting these ip-numbers added to