2009/7/22 Jeppe Øland <[email protected]>:
>>>>>> Some of my pfsense boxes get a lot of SSH bruteforces; is there a
>>>>>> package like fail2ban out there which could automatically blacklist
>>>>>> IPs after x
>>>>> Request: It would be really nice if pfsense could limit the
>>>>> connection-rate *per IP*.
>>>> IIRC it is possible to set this per source-IP ;-)
>>> Maybe I missed an option then?
>>> How do you configure it?
>> This is configured through the Advanced options in each Filter-Rule.
>> Ich you set 5 Connection see attached picture ;-)
>
> The way I read these options are:
> * Simultaneous client connection limit
> The number of simultaneous connections each client can have.
> * Maximum new connections / per second
> Global maximum connection limits.

also related per Source-IP, so far  as i understand the lines in
XML-Backup-File right
the pf-filter itself supports it in this way, and i think pfsense use
it in this way...
as you can see...
====snip===8<=====
 <rule>
                        <type>pass</type>
                        <interface>wan</interface>
                        <max-src-nodes>5</max-src-nodes>
                        <max-src-states/>
                        <statetimeout/>
                        <statetype>keep state</statetype>
                        <os/>
                        <max-src-conn-rate>5</max-src-conn-rate>
                        <max-src-conn-rates>60</max-src-conn-rates>
                        <protocol>tcp</protocol>
                        <source>
                                <any/>
                        </source>
                        <destination>
                                <address>mcip</address>
                                <port>22</port>
                        </destination>
                        <descr>limited ssh access to max 5 conn/host 5
conn/minute</descr>
                </rule>
=====>8=====snap=========

> The first option will limit how many concurrent SSH sessions I can run from
> any one IP.
> The second option will limit how many connections can be attempted per
> interval.
> As far as I know, setting a client connection limit will *not* prevent the
> connection/time limit from killing you in case somebody starts hammering the
> server.

it does you prevent, because its related to each own source-ip....if i
was right...

> Am I not reading these options right?
> (Some documentation would be nice too *G*)
>> Yes, only using SSH-Keys is an very good option, but not useful if you
>> are on the Way or you have your keys not by hand..... ;-)
>
> Indeed everything is a compromise.
> Changing the port also has issues since some admins won't allow all ports
> outbound (of course they might not allow SSH out either).

:-D you could set it to allowed common port, ok ok , this brings
propably other issues.....
using port 80 or 443 or 25 is not really nice....

> Regards,
> -Jeppe

regards

michael


-- 
= = =  m  i  c  h  a  e  l  -  s  c  h  u  h  .  n  e  t  = = =
Projektmanagement - IT-Consulting - Professional Services IT
Michael Schuh
Postfach 10 21 52
66021 Saarbrücken
phone: 0681/8319664
mobil:  0175/5616453
@: m i c h a e l . s c h u h @ g m a i l . c o m

= = =  Ust-ID:  DE251072318  = = =

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Commercial support available - https://portal.pfsense.org

Reply via email to