Dear Friends Greetings,
i have a question for you, i am sure someone can help. The pfsense captive
portal is up and running. Time countdown vouchers are working without
issue, such as 30m, 45m, 1h so on.
However, I'd like to set up a download quota of 200MB per voucher. but
then you need to
be greatly
appreciated.
Thanks / Shiv. Nath
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to freebsd-stable-unsubscr...@freebsd.org
Dear Experts
i am sure many of you would be the part of the real game, where lot of
technology is implemented (Internet Service Providers) those serve
thousands of clients everyday . i am requesting opinion advice from
those experts. Surfing web does not help much unless someone who is
.FreeBSD.org...
failed.
No mirrors remaining, giving up.
Thanks / Shiv. Nath
___
freebsd-stable@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-stable
To unsubscribe, send any mail to freebsd-stable-unsubscr...@freebsd.org
for 9.1-RELEASE from update5.FreeBSD.org...
failed.
Fetching metadata signature for 9.1-RELEASE from update4.FreeBSD.org...
failed.
Fetching metadata signature for 9.1-RELEASE from update3.FreeBSD.org...
failed.
No mirrors remaining, giving up.
Thanks / Shiv. Nath
/boot/device.hints
# Add this to the end of the file
hint.acpi_throttle.0.disabled=1
vi /boot/loader.conf
# Add this to the end of the file
hint.acpi_throttle.0.disabled=1#8243;
Thanks / Shiv. Nath
___
freebsd-stable@freebsd.org mailing list
http
Dear Friends of List,
Well, i understand perhaps someone will think if it is correct please to
ask this question here. But i did not find the better place than here.
Here is community of technical people and the question is technical as
well.
Question:
Is anyone aware of such program
Dear FreeBSD Guys,
It is FreeBSD Release 9.0 x64 and i see this log very frequent almost
every second, And i want to block this IP from reaching my server. i
configured the PF as following but still see the same logs, it is like
it did not work.
block in log quick from 41.211.2.239/32 to
Sep 11 07:49:56 titan avahi-daemon[1567]: Received response from host
41.211.2.239 with invalid source port 4331 on interface 'em0.0'
Sep 11 07:50:25 titan avahi-daemon[1567]: Received response from host
41.211.2.239 with invalid source port 38627 on interface 'em0.0'
Sep 11 07:51:29 titan
I would actually question why avahi is even enabled on a server; perhaps
the correct answer is simply to disable it in rc.conf.
You do know that avahi-daemon's main use is to advertise _services_running on a
host?
Yes, but zeroconf-style services are often more of a peer-to-peer nature
On 16/06/2012 21:03, Shiv. Nath wrote:
Dear Matthew,
Matthew, one a, one e.
first thanks for assisting to secure 22/25 ports from brute force
attack.
i wish to consult if the following white list looks fine to exclude
trusted networks (own network)
int0=em0
secured_attack_ports={21,22,25
On Jun 15, 2012, at 12:55 PM, Shiv. Nath wrote:
# START
table bruteforce persist
block in log quick from bruteforce
pass in on $ext_if proto tcp \
from any to $ext_if port $trusted_tcp_ports \
flags S/SA keep state \
(max-src-conn-rate 3/300, overload bruteforce flush global)
# END
Ooops. Yes, -t bruteforce is correct. expire 604800 means delete
entries after they've been in the table for that number of seconds (ie
after one week)
Cheers,
Matthew
--
Dr Matthew J Seaman MA, D.Phil. 7 Priory Courtyard
Hi FreeBSD Gurus,
i want to use PF to Preventing SMTP Brute Force Attacks. i need some help
to understand correct syntax.
URL Explaining this: http://www.openbsd.org/faq/pf/filter.html#stateopts
i expect the following behavior from the PF rule below:
Limit the absolute maximum number of
Limiting yourself to 200 states won't protect you very much -- you tend
to get a whole series of attacks from the same IP, and that just uses
one state at a time.
Instead, look at the frequency with which an attacker tries to connect
to you. Something like this:
table bruteforce persist
Dear Mattthew,
Grateful for sending me in right direction, solution really sounds well.
Does it look good configuration for /etc/pf.conf ?
# START
table bruteforce persist
Watch the syntax -- it's table bruteforce persist with angle brackets.
block in log quick from bruteforce
pass
16 matches
Mail list logo