captive Portal Pfsense + FreeRadius + MySQL DBMS

2012-12-12 Thread Shiv. Nath
Dear Friends Greetings, i have a question for you, i am sure someone can help. The pfsense captive portal is up and running. Time countdown vouchers are working without issue, such as 30m, 45m, 1h & so on. However, I'd like to set up a download quota of 200MB per voucher. but then you need to lo

captive Portal Pfsense + FreeRadius + MySQL DBMS

2012-12-11 Thread Shiv. Nath
nt reference would be greatly appreciated. Thanks / Shiv. Nath ___ freebsd-stable@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-stable To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"

WiFi / Hot-Spot Open Source World

2012-12-10 Thread Shiv. Nath
Dear Experts i am sure many of you would be the part of the real game, where lot of technology is implemented (Internet Service Providers) those serve thousands of clients everyday . i am requesting opinion & advice from those experts. Surfing web does not help much unless someone who is practical

Update Failing FreeBSD 9.1-Release

2012-12-05 Thread Shiv. Nath
for 9.1-RELEASE from update5.FreeBSD.org... failed. Fetching metadata signature for 9.1-RELEASE from update4.FreeBSD.org... failed. Fetching metadata signature for 9.1-RELEASE from update3.FreeBSD.org... failed. No mirrors remaining, giving up. Thanks / Shiv. Nath

FreeBSDD Upgrade Failing

2012-12-05 Thread Shiv. Nath
.FreeBSD.org... failed. No mirrors remaining, giving up. Thanks / Shiv. Nath ___ freebsd-stable@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-stable To unsubscribe, send any mail to "freebsd-stable-unsubscr...@freebsd.org"

Failed to attach P_CNT - FreeBSD 9.1 RC3

2012-11-04 Thread Shiv. Nath
/boot/device.hints # Add this to the end of the file hint.acpi_throttle.0.disabled="1" vi /boot/loader.conf # Add this to the end of the file hint.acpi_throttle.0.disabled=”1″ Thanks / Shiv. Nath ___ freebsd-stable@freebsd.org mailing

Alert When Hardware Changes !

2012-10-05 Thread Shiv. Nath
Dear Friends of List, Well, i understand perhaps someone will think if it is correct please to ask this question here. But i did not find the better place than here. Here is community of technical people and the question is technical as well. Question: Is anyone aware of such program (software)

Re: PF Configuration - FreeBSD Release 9.0 x64

2012-09-11 Thread Shiv. Nath
I would actually question why avahi is even enabled on a server; perhaps the correct answer is simply to disable it in rc.conf. You do know that avahi-daemon's main use is to advertise _services_running on a host? Yes, but zeroconf-style services are often more of a peer-to-peer nature instead

Re: PF Configuration - FreeBSD Release 9.0 x64

2012-09-11 Thread Shiv. Nath
Sep 11 07:49:56 titan avahi-daemon[1567]: Received response from host 41.211.2.239 with invalid source port 4331 on interface 'em0.0' Sep 11 07:50:25 titan avahi-daemon[1567]: Received response from host 41.211.2.239 with invalid source port 38627 on interface 'em0.0' Sep 11 07:51:29 titan avahi-

PF Configuration - FreeBSD Release 9.0 x64

2012-09-11 Thread Shiv. Nath
Dear FreeBSD Guys, It is FreeBSD Release 9.0 x64 and i see this log very frequent almost every second, And i want to block this IP from reaching my server. i configured the PF as following but still see the same logs, it is like it did not work. block in log quick from 41.211.2.239/32 to any

Re: USE PF to Prevent SMTP Brute Force Attacks - Resolved !!!

2012-06-17 Thread Shiv. Nath
On 16/06/2012 21:03, Shiv. Nath wrote: Dear Matthew, Matthew, one a, one e. first thanks for assisting to secure 22/25 ports from brute force attack. i wish to consult if the following white list looks fine to exclude trusted networks (own network) int0="em0" secured_attack_ports=

Re: USE PF to Prevent SMTP Brute Force Attacks - Resolved !!!

2012-06-16 Thread Shiv. Nath
>> Ooops. Yes, -t bruteforce is correct. "expire 604800" means delete >> entries after they've been in the table for that number of seconds (ie >> after one week) >> >> Cheers, >> >> Matthew >> >> -- >> Dr Matthew J Seaman MA, D.Phil. 7 Priory Courtyard >>

Re: PF to Preventing SMTP Brute Force Attacks

2012-06-16 Thread Shiv. Nath
> On Jun 15, 2012, at 12:55 PM, Shiv. Nath wrote: > >> # START >> table bruteforce persist >> block in log quick from bruteforce >> >> pass in on $ext_if proto tcp \ >> from any to $ext_if port $trusted_tcp_ports \ >> flags S/SA keep state \ >&g

Re: PF to Preventing SMTP Brute Force Attacks

2012-06-15 Thread Shiv. Nath
>> Dear Mattthew, >> >> Grateful for sending me in right direction, solution really sounds well. >> Does it look good configuration for "/etc/pf.conf" ? >> >> # START >> table bruteforce persist > > Watch the syntax -- it's table persist with angle brackets. > >> block in log quick from bruteforc

Re: PF to Preventing SMTP Brute Force Attacks

2012-06-15 Thread Shiv. Nath
> Limiting yourself to 200 states won't protect you very much -- you tend > to get a whole series of attacks from the same IP, and that just uses > one state at a time. > > Instead, look at the frequency with which an attacker tries to connect > to you. Something like this: > > table persist > >

PF to Preventing SMTP Brute Force Attacks

2012-06-15 Thread Shiv. Nath
Hi FreeBSD Gurus, i want to use PF to Preventing SMTP Brute Force Attacks. i need some help to understand correct syntax. URL Explaining this: http://www.openbsd.org/faq/pf/filter.html#stateopts i expect the following behavior from the PF rule below: Limit the absolute maximum number of state