On 2022-09-06, Carlos López Martínez <[email protected]> wrote:
> I have a very important question with massive requests to udp ports. 
> Until now I had the following options configured:
>
> (max-src-conn 30, max-src-conn-rate 10/1, overload <bruteforce> flush 
> global)
>
> I have several services published through udp, most importantly 
> WireGuard, but I'm not sure about activating those options. For exmaple, 
> using the following options for tcp:
>
> (max-src-conn 10, max-src-conn-rate 15/5, overload <bruteforce> flush 
> global)
>
> several IPs goes to bruteforce table ... but for udp, nothing .... and t 
> it seems strange to me.
>
> Is my config ok or do you see some gotchas?

Those options are for TCP which requires 2-way communications and
is relatively hard to spoof unless you're on the network path.

UDP is often trivial to spoof (there are still a fair number of
end-user ISPs/colos that still don't do ingress filtering) so
blocking based on potentially faked IP addresses (e.g. someone
spoofing packets with source IPs that belong to google/some big
cdn/root name servers/etc could cause a lot of disruption if
they could trigger a block). So PF doesn't do this.

It's explained a bit in pf.conf(5) as well.

-- 
Please keep replies on the mailing list.

Reply via email to