Redd Vinylene wrote:
...
You can also use two tables so that the first overload gets shunted to a
slow queue and given a second chance before ending up in the second
table which gets blocked.
...
Lars Noodin: Would you happen to have an example of that?
Not really, here is an illustration
On Mon, Sep 22, 2008 at 10:36 AM, Lars Noodin
[EMAIL PROTECTED]wrote:
Redd Vinylene wrote:
...
You can also use two tables so that the first overload gets shunted to a
slow queue and given a second chance before ending up in the second
table which gets blocked.
...
Lars Noodin: Would
Redd Vinylene wrote:
... a second chance?
Well ssh on port 22 does occasionally have legitmate uses and even
occasionally legitimate users. So some kind of indicator (such as a
slowdown) could be useful for them.
-Lars
From: Redd Vinylene [EMAIL PROTECTED]
To: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: pf to block against DDoS?
Date: Thursday, September 4, 2008 - 3:23 pm
Hello hello!
I was quite shocked today when I heard I could use pf to block
against DDoS
attacks, using
From: Redd Vinylene [EMAIL PROTECTED]
To: [EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: pf to block against DDoS?
Date: Thursday, September 4, 2008 - 3:23 pm
Hello hello!
I was quite shocked today when I heard I could use pf to block
against DDoS
attacks, using
Oliver Peter [EMAIL PROTECTED] writes:
I can recommend reading through this as well:
http://www.bgnett.no/~peter/pf/en/bruteforce.html
Thanks for recommending that! However I would generally recommend the
maintained version which is up at http://home.nuug.no/~peter/pf/,
with the direct link
Hello hello!
I was quite shocked today when I heard I could use pf to block against DDoS
attacks, using Stateful Tracking Options,
http://www.openbsd.org/faq/pf/filter.html#stateopts.
But does anybody have any nice setups of this they'd want to share?
Much obliged, and thanks.
--
http
On Thu, Sep 04, 2008 at 09:23:09PM +0200, Redd Vinylene wrote:
Hello hello!
I was quite shocked today when I heard I could use pf to block against DDoS
attacks, using Stateful Tracking Options,
http://www.openbsd.org/faq/pf/filter.html#stateopts.
But does anybody have any nice setups
What exactly are you looking for? Are you looking for example rulesets?
Thanks
Subhro
On 9/5/08, Redd Vinylene [EMAIL PROTECTED] wrote:
Hello hello!
I was quite shocked today when I heard I could use pf to block against DDoS
attacks, using Stateful Tracking Options,
http://www.openbsd.org
Oliver Peter wrote:
I can recommend reading through this as well:
http://www.bgnett.no/~peter/pf/en/bruteforce.html
You can also use two tables so that the first overload gets shunted to a
slow queue and given a second chance before ending up in the second
table which gets blocked.
-Lars
On Sep 4, 2008, at 12:23 PM, Redd Vinylene wrote:
I was quite shocked today when I heard I could use pf to block
against DDoS
attacks, using Stateful Tracking Options,
http://www.openbsd.org/faq/pf/filter.html#stateopts.
But does anybody have any nice setups of this they'd want to share
11 matches
Mail list logo