captive Portal Pfsense + FreeRadius + MySQL DBMS

2012-12-12 Thread Shiv. Nath
Dear Friends Greetings, i have a question for you, i am sure someone can help. The pfsense captive portal is up and running. Time countdown vouchers are working without issue, such as 30m, 45m, 1h so on. However, I'd like to set up a download quota of 200MB per voucher. but then you need to

captive Portal Pfsense + FreeRadius + MySQL DBMS

2012-12-11 Thread Shiv. Nath
be greatly appreciated. Thanks / Shiv. Nath ___ freebsd-stable@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-stable To unsubscribe, send any mail to freebsd-stable-unsubscr...@freebsd.org

WiFi / Hot-Spot Open Source World

2012-12-10 Thread Shiv. Nath
Dear Experts i am sure many of you would be the part of the real game, where lot of technology is implemented (Internet Service Providers) those serve thousands of clients everyday . i am requesting opinion advice from those experts. Surfing web does not help much unless someone who is

FreeBSDD Upgrade Failing

2012-12-05 Thread Shiv. Nath
.FreeBSD.org... failed. No mirrors remaining, giving up. Thanks / Shiv. Nath ___ freebsd-stable@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-stable To unsubscribe, send any mail to freebsd-stable-unsubscr...@freebsd.org

Update Failing FreeBSD 9.1-Release

2012-12-05 Thread Shiv. Nath
for 9.1-RELEASE from update5.FreeBSD.org... failed. Fetching metadata signature for 9.1-RELEASE from update4.FreeBSD.org... failed. Fetching metadata signature for 9.1-RELEASE from update3.FreeBSD.org... failed. No mirrors remaining, giving up. Thanks / Shiv. Nath

Failed to attach P_CNT - FreeBSD 9.1 RC3

2012-11-04 Thread Shiv. Nath
/boot/device.hints # Add this to the end of the file hint.acpi_throttle.0.disabled=1 vi /boot/loader.conf # Add this to the end of the file hint.acpi_throttle.0.disabled=”1#8243; Thanks / Shiv. Nath ___ freebsd-stable@freebsd.org mailing list http

Alert When Hardware Changes !

2012-10-05 Thread Shiv. Nath
Dear Friends of List, Well, i understand perhaps someone will think if it is correct please to ask this question here. But i did not find the better place than here. Here is community of technical people and the question is technical as well. Question: Is anyone aware of such program

PF Configuration - FreeBSD Release 9.0 x64

2012-09-11 Thread Shiv. Nath
Dear FreeBSD Guys, It is FreeBSD Release 9.0 x64 and i see this log very frequent almost every second, And i want to block this IP from reaching my server. i configured the PF as following but still see the same logs, it is like it did not work. block in log quick from 41.211.2.239/32 to

Re: PF Configuration - FreeBSD Release 9.0 x64

2012-09-11 Thread Shiv. Nath
Sep 11 07:49:56 titan avahi-daemon[1567]: Received response from host 41.211.2.239 with invalid source port 4331 on interface 'em0.0' Sep 11 07:50:25 titan avahi-daemon[1567]: Received response from host 41.211.2.239 with invalid source port 38627 on interface 'em0.0' Sep 11 07:51:29 titan

Re: PF Configuration - FreeBSD Release 9.0 x64

2012-09-11 Thread Shiv. Nath
I would actually question why avahi is even enabled on a server; perhaps the correct answer is simply to disable it in rc.conf. You do know that avahi-daemon's main use is to advertise _services_running on a host? Yes, but zeroconf-style services are often more of a peer-to-peer nature

Re: USE PF to Prevent SMTP Brute Force Attacks - Resolved !!!

2012-06-17 Thread Shiv. Nath
On 16/06/2012 21:03, Shiv. Nath wrote: Dear Matthew, Matthew, one a, one e. first thanks for assisting to secure 22/25 ports from brute force attack. i wish to consult if the following white list looks fine to exclude trusted networks (own network) int0=em0 secured_attack_ports={21,22,25

Re: PF to Preventing SMTP Brute Force Attacks

2012-06-16 Thread Shiv. Nath
On Jun 15, 2012, at 12:55 PM, Shiv. Nath wrote: # START table bruteforce persist block in log quick from bruteforce pass in on $ext_if proto tcp \ from any to $ext_if port $trusted_tcp_ports \ flags S/SA keep state \ (max-src-conn-rate 3/300, overload bruteforce flush global) # END

Re: USE PF to Prevent SMTP Brute Force Attacks - Resolved !!!

2012-06-16 Thread Shiv. Nath
Ooops. Yes, -t bruteforce is correct. expire 604800 means delete entries after they've been in the table for that number of seconds (ie after one week) Cheers, Matthew -- Dr Matthew J Seaman MA, D.Phil. 7 Priory Courtyard

PF to Preventing SMTP Brute Force Attacks

2012-06-15 Thread Shiv. Nath
Hi FreeBSD Gurus, i want to use PF to Preventing SMTP Brute Force Attacks. i need some help to understand correct syntax. URL Explaining this: http://www.openbsd.org/faq/pf/filter.html#stateopts i expect the following behavior from the PF rule below: Limit the absolute maximum number of

Re: PF to Preventing SMTP Brute Force Attacks

2012-06-15 Thread Shiv. Nath
Limiting yourself to 200 states won't protect you very much -- you tend to get a whole series of attacks from the same IP, and that just uses one state at a time. Instead, look at the frequency with which an attacker tries to connect to you. Something like this: table bruteforce persist

Re: PF to Preventing SMTP Brute Force Attacks

2012-06-15 Thread Shiv. Nath
Dear Mattthew, Grateful for sending me in right direction, solution really sounds well. Does it look good configuration for /etc/pf.conf ? # START table bruteforce persist Watch the syntax -- it's table bruteforce persist with angle brackets. block in log quick from bruteforce pass