On 2/3/2010 7:57 PM, Jim Pingle wrote:
> On 2/3/2010 2:35 PM, Nathan Eisenberg wrote:
>> It would be incredibly handy to build a report that summarizes the number of 
>> states open, groups by IP.  That way, one could easily identify a DOS origin.
>>
>> For example, I just had an attacker attempt to open 40,000 simultaneously 
>> HTTP sessions on one of my servers.  I'd love to be able to see something 
>> like this:
>>
>> Proto                Source          SRC Ports               DST Ports
>> TCP          10.0.x.x                40,000          1
>> TCP          74.1.x.x                16                      1
>> TCP          63.5.x.x                10                      1
>> TCP          152.4.x.x               4                       1
> 
> That may not be too difficult to pull off, just some basic regex work
> and knowledge of the output of "pfctl -ss". Though the format of such a
> report would end up being a bit more complicated than the output you show.
> 
> There are incoming connections, outgoing connections, outgoing NAT
> connections, incoming NAT connections (port forwards), etc, etc. And it
> looks like some detail is only listed in pfctl -ss while a state is
> active. The output you are talking about would only be a subset of the
> whole -- namely, outgoing NAT connections.
> 
> I might see if I can make something useful out of it. It may not take
> long, but that depends on available time.

I just committed a basic package that adds Diagnostics > State Summary,
which has somewhat of a similar form to what you're after. It probably
needs some more refinement, but the info is there.


---------------------------------------------------------------------
To unsubscribe, e-mail: support-unsubscr...@pfsense.com
For additional commands, e-mail: support-h...@pfsense.com

Commercial support available - https://portal.pfsense.org

Reply via email to