Re: promt solution with max-src-conn-rate

2006-05-15 Thread GreenX FreeBSD
> Run a script watching the logs for anyone failing logins and add those addresses to a block list. > --Bill It is useless work, now I am not going to leave border of Russia is already in 10 times less than potential addresses, but all the same very much, it is a lot of. :) There is a nic

Re: promt solution with max-src-conn-rate

2006-05-15 Thread Travis H.
I also have plans to write a sniffer to detect this kind of misuse without log-parsing, and the idea is to implement it at your gateway choke-point so it can detect it against any inbound connection, regardless of the ultimate source. Sorry to mention vaporware, but I'm pretty close to finishing

Re: promt solution with max-src-conn-rate

2006-05-15 Thread Travis H.
You have to be aware that this otoh might open you to DoS attacks. People spoofing connections from your address will lock you out from your own server. It requires spoofing a full TCP connect, which is more difficult than most DoS types are willing to do. Even harder if you're doing "reassemb

Re: promt solution with max-src-conn-rate

2006-05-15 Thread Lyndon Nerenberg
On May 15, 2006, at 6:29 PM, Scott Ullrich wrote: You have to be aware that this otoh might open you to DoS attacks. People spoofing connections from your address will lock you out from your own server. An alternative is available for PF that monitors the ssh syslog. Take a look at: htt

Re: promt solution with max-src-conn-rate

2006-05-15 Thread Scott Ullrich
On 5/15/06, Max Laier <[EMAIL PROTECTED]> wrote: You have to be aware that this otoh might open you to DoS attacks. People spoofing connections from your address will lock you out from your own server. An alternative is available for PF that monitors the ssh syslog. Take a look at: http://pfs

Re: promt solution with max-src-conn-rate

2006-05-15 Thread Max Laier
On Tue, May 16, 2006 1:17 am, Kian Mohageri wrote: >> >> There is a nice and easy way to blocking ssh brute-force attempts with >> pf >> only: >> >> http://legonet.org/~griffin/openbsd/block_ssh_bruteforce.html > > > > Exactly. This is a much cleaner solution than portknocking to stop brute > f

Re: promt solution with max-src-conn-rate

2006-05-15 Thread Kian Mohageri
There is a nice and easy way to blocking ssh brute-force attempts with pf only: http://legonet.org/~griffin/openbsd/block_ssh_bruteforce.html Exactly. This is a much cleaner solution than portknocking to stop brute force attacks. I recently implemented this on a few of my servers. __

Re: promt solution with max-src-conn-rate

2006-05-15 Thread Viktor Vasilev
On Monday 15 May 2006 18:07 Bill Marquette wrote: > On 5/15/06, GreenX FreeBSD <[EMAIL PROTECTED]> wrote: > > > I'd advise against what you're trying to do. It won't make your box > > > more secure. > > > > Why? > > Simply so, on ssh you will not come any more. > > If I am not mistaken, probability

Re: promt solution with max-src-conn-rate

2006-05-15 Thread Bill Marquette
On 5/15/06, GreenX FreeBSD <[EMAIL PROTECTED]> wrote: > I'd advise against what you're trying to do. It won't make your box > more secure. Why? Simply so, on ssh you will not come any more. If I am not mistaken, probability of that the scanner will begin the check with "key" port, and further at

Re: promt solution with max-src-conn-rate

2006-05-15 Thread GreenX FreeBSD
Kian Mohageri пишет: you're probably trying to use this on a port where nothing is listening. Yes, I understand it, and I about it have written in my letter. I think above that how to make so that worked on not listening port. It is possible certainly, simply to redirect on any something respond

Re: broken ip checksum after frag reassemble of nfs READDIR?

2006-05-15 Thread Daniel Hartmeier
On Mon, May 15, 2006 at 02:24:41PM +1200, Andrew Thompson wrote: > Looks good to me and it looks like its working for Adam. Did you want to > commit this Daniel?, ive made a few comments below. Commited to HEAD including your changes. Daniel ___ freebs

Current problem reports assigned to you

2006-05-15 Thread FreeBSD bugmaster
Current FreeBSD problem reports Critical problems Serious problems S Submitted Tracker Resp. Description --- o [2005/06/15] kern/82271 pf [pf] cbq scheduler cause bad latency f [2005/07/31] kern/8437