What I did was simply set the firewall rule advanced settings. Here I
set "2 Maximum new connections / 60 seconds".
Looking at the rule, I'm not sure if it checks for multiple
connections from the same host, or just for multiple connections in
general.
Technically I guess this means that a malicio
i changed both the client and server to tcp and it looks like
similiar errors. here is part of the client logs...
Sep 3 00:54:22 UNIXBOX openvpn[4112]: Local Options String: 'V4,dev-
type tun,link-mtu 1543,tun-mtu 1500,proto TCPv4_CLIENT,cipher BF-
CBC,auth SHA1,keysize 128,key-method 2,tls
hi,
i'm trying to get openvpn running on pfsense 1.2 working with
tunnelblick on my macbook. the link below shows my server config,
client config, and client log file. any suggestions are appreciated.
http://pastebin.com/d50a50091
thanks,
-phil
---
I'm interesting in this solution, can you explain hoy you did this??
best regards
2008/8/31, Jeppe Øland <[EMAIL PROTECTED]>:
> Hi,
>
> I just set up the firewall hole for SSH to block if more than a few
> connections were made from the same host within a minute or so.
> All the brute-force attack