c0co wrote:

> This probably depends on what's in your current logging and why you're 
> concluding that it's reflection.
> 
> A KISS solution might be to eval the logs, identify the consistent indicators 
> of bad traffic, and pass the src IPs (spoofed or otherwise) into a dedicated 
> block table in PF.

What seemed to work for now was blocking traffic with a src port of 0-1024 and 
a dest port of one of the running services, e.g. HTTP.

The forged packets almost always had a source port of 22, 80, or 443.

Regards
Lloyd



Reply via email to