J Moore wrote:

On Fri, Nov 11, 2005 at 11:29:52PM +0100, the unit calling itself Fabien 
Germain wrote:
On 11/11/05, J.D. Bronson <[EMAIL PROTECTED]> wrote:
then add a rule like this....

pass in quick on $ext_if proto tcp from any to ($ext_if) port 22 keep state
(max-src-conn-rate 3/10, overload <attackers> flush)

Excelent, i supose this works for any kind of traffic, just change the port.
Is there a way to configure a timeout with the overload <attackers> part, i mean, im thinking on activate this for my email servers, if some zomby machine tries to flood my email server it will be addedd to the attackers table, it would be nice that only for some configurable time, after that the ip is dropped from the table, i've seen this with yahoo, sometimes a customer is infected with the brand new microsft virus of the week, he sends thousands of emails to one of my smtp relays and yahoo blacklist the relays's ip, dropping every mail with a message like "sorry, too many conections from 200.156.25.32", after some time im able to send email to yahho again.
Thanks

Reply via email to