On 1/21/06, Forrest Aldrich [EMAIL PROTECTED] wrote:
I saw an older thread where someone asked about this, but it applied to
a web server.
Could apply to anything.
Are there any ways to detect and/or limit the number of connections
coming in per IP, or act according to some other action
Forrest Aldrich wrote:
I saw an older thread where someone asked about this, but it applied
to a web server.
I'm seeing a jump in the number of botnet smtp floods on my system,
and it's time to implement something more proactive. Since I use PF,
that's the logical place to start... (and
Anyone know what's going on with freebsd.org?
On Sun, 22 Jan 2006 09:09:53 -0800
William Ross [EMAIL PROTECTED] wrote:
pf@benzedrine.cx
Its back. Must have been an upgrade.
2006/1/22, Cristiano Deana [EMAIL PROTECTED]:
# block the spammers
block drop in quick on $ext_if from ssh-bruteforce
Wrong cut paste:
s/ssh-bruteforce/spammers/
--
Cris, member of G.U.F.I
Italian FreeBSD User Group
http://www.gufi.org/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
William Ross wrote:
Anyone know what's going on with freebsd.org?
I am not sure what you are making reference to but the website comes up
fine for me. Looks like nothing is going on with that piece.
- --
http://www.digitalrage.org/
The Information
2006/1/21, Forrest Aldrich [EMAIL PROTECTED]:
Are there any ways to detect and/or limit the number of connections
coming in per IP, or act according to some other action (maybe a script
watching the SMTP logs).
I'm also using PF on FreeBSD-6, FYI. There may be some other tool that
Thank you. This is very helpful.
Question: for those sites that you receive more frequent connections
from (like mailing lists), I wonder if this might create a problem - I
suppose I could create a table lists and place a rule BEFORE this as
an exception?
Thanks,
Forrest
Cristiano Deana