On 10/30/16 01:46, Nicolai wrote:

> BTW, there are generally better options for handling bruteforce
> traffic.  What kind of bruteforce traffic are you trying to stop?

In the classic case of rapid-fire bruteforcers an adaptive, state
tracking based approach such as [1] works quite well.

However in addition you have a set of bruteforcers that come in at
frequencies just low enough that it gets hard to auto-block them that
way and not interfering with ordinary users's activity. Not necessarily
"the Hail Mary Cloud", but rather a few very persistent but slow moving
bots. If this is what the original poster is trying to address, blocking
on an additional table sourced from a file might be useful.

[1] https://home.nuug.no/~peter/pf/en/bruteforce.html

-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.

Reply via email to