On Mon, Feb 27, 2006 at 10:21:22AM -0500, Chris Smith wrote:

> On Saturday 25 February 2006 19:34, Morten Larsen wrote:
> > It would be nice if you cold do something like:
> >
> > block in on $ext_if proto {tcp, udp} from any to any port 135:139
> > overload <infected> flush global
> 
> That would sure clean up the Internet! Quite funny.
> 
> But it would really be nice to load a table during blocks, maybe with 
> something like a max-conn-attempts-rate.

This would also mean allocating memory for addresses you don't want to
accept connections from. Think of how someone might exhaust your memory
with a flood of spoofed SYNs. It might pay off for non-spoofed floods,
but it certainly makes you more vulnerable to spoofed ones.

Right now, we only keep track (allocate memory) of addresses when you
actually want to accept at least a few connections from someone. The
idea is that if you're willing to allocate a state entry, keeping track
of how many connection attempts that address made recently is ok.

Daniel

Reply via email to