Hi Steve
Try to add below to your pf.conf table <bruteforce> persist pass in on $ext_if inet proto tcp from any to $ext_if port 1194 \ (max-src-conn 10, max-src-conn-rate 30/5, \ overload <bruteforce> flush global) T -----Original Message----- From: owner-m...@openbsd.org [mailto:owner-m...@openbsd.org] On Behalf Of Steve Fairhead Sent: 19 December 2018 21:27 To: misc@openbsd.org Subject: blocking openvpn port scanners I'm probably missing something obvious. Cluebats invited. A few OpenBSD servers I look after have OpenVPN server installed (for homeworkers' access), which means port 1194 is open. Recently they seem to have appeared on some scumbag's "hack this" list, as they're constantly deluged with brute-force hack attacks. A snippet from openvpn.log: >> Wed Dec 19 18:28:53 2018 185.81.153.117:55881 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) Wed Dec 19 18:28:53 2018 185.81.153.117:55881 TLS Error: TLS handshake failed Wed Dec 19 18:28:53 2018 185.81.153.117:64379 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) Wed Dec 19 18:28:53 2018 185.81.153.117:64379 TLS Error: TLS handshake failed Wed Dec 19 18:28:53 2018 185.81.153.117:27493 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) Wed Dec 19 18:28:53 2018 185.81.153.117:27493 TLS Error: TLS handshake failed << (IP addresses obscured to protect the sinner - no, wait...)(and logfile filtered by "failed".) For now, I manually log the above IPs and add them to a badhosts file - no more access of any kind for you, mwahaha. But it's a lot of work, and my logfile is just noise... I already use pf.conf to protect my ssh port against such attacks (rate-limiting). Can I do anything similar with pf for the openvpn port? Don't want to block real users if they screw up once or twice... although they are few enough that I can be super-aggressive in denying access, and sort it out by phone... Maybe I shouldn't even worry about it, but I'd really like to hit back. (See above re "mwahaha".) Steve