Hello Peter,

I think you suggest me some work around like max-src-conn-rate, right?

On Sat, Oct 9, 2021 at 5:07 PM Peter Nicolai Mathias Hansteen <
pe...@bsdly.net> wrote:

>
>
> > 7. okt. 2021 kl. 15:58 skrev Barbaros Bilek <barbarosb...@gmail.com>:
> >
> > Hello misc,
> >
> > I try to block port scanning attempts with OpenBSD 6.9/amd64 + PF.
> > At the top of my pf.conf i've added these lines but it didn't work.
> >
> > block in quick proto tcp all flags SF/SFRA label bps1
> > block in quick proto tcp all flags FPU/SFRAUP label bps3
> > block in quick proto tcp all flags /SFRA label bps4
> > block in quick proto tcp all flags F/SFRA label bps5
> > block in quick proto tcp all flags U/SFRAU label bps6
>
> I personally find rules that specific to be too much work to even decipher.
>
> What is it you are trying to achieve here?
>
> If you want specifically to detect port scans, I have a hunch you would be
> better off constructing something out of state tracking options and
> overload tables.
>
> That said, I have tended to generally recommend to start off your rules
> with a «block" (which will expand to "block drop all"), then fill in the
> ruleset with pass rules and whatever else you need that will let the
> traffic you want to allow to pass.
>
> If you search the net with the obvious keywords you will find quite a few
> examples that can be quite instructive (including some of my own screeds at
> the first URL in my .signature).
>
> All the best,
> Peter N. M. Hansteen
>
> —
> Peter N. M. Hansteen, member of the first RFC 1149 implementation team
> http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
> "Remember to set the evil bit on all malicious network traffic"
> delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.
>
>
>
>
>

Reply via email to