Hi Pantelis,

On 2015-09-24 Thu 12:37 PM |, Pantelis Roditis wrote:
> 
> This is the exact reason why we created bofh-divert[1]. The idea is that you
> pass those packets with PF to a divert socket opened by a daemon. The daemon
> grabs the source IP and adds it to a predefined table.
> 

Wow, that looks like the ticket.

If nothing else, I was considering a fake inetd driven telnet daemon,
which would just be a script to drive netcat, grab the remote ip & pfctl
add it to a table.

With pf re-directs to it for commonly attacked ports, finishing up with:
block in log from <scanners>

Cheers.
-- 
The only possible interpretation of any research whatever in the
`social sciences' is: some do, some don't.
                -- Ernest Rutherford

Reply via email to