> 10. jan. 2021 kl. 14:47 skrev Steve Fairhead <st...@fivetrees.com>:
> 
> Hi folks,
> 
> I hope I'm just missing something stupid. It's been a while since I deployed 
> public OpenBSD servers, but I've done plenty. I always use a defence in 
> pf.conf against brute-force SSH attacks, which has served me well in the past.
> 
> On a new machine running 6.8, this no longer appears to work. I've stripped 
> it back to:
> 
> table <scanners> persist file "/etc/scanners"
> 
> block quick from <scanners>
> 
> pass quick proto tcp from any to any port ssh flags S/SA keep state \
>       (max-src-conn 10, max-src-conn-rate 3/15, overload <scanners> flush 
> global)
> 
> (taken directly from https://home.nuug.no/~peter/pf/en/bruteforce.html )

Taking a peek at what I run the main difference I see is that I do a block by 
default at the very beginning of my pf.conf, and

# pass proto tcp to port ssh
pass in quick log (all) on egress proto tcp to port ssh flags S/SA keep state \
        (max-src-conn 15, max-src-conn-rate 2/10, overload <bruteforce> flush 
global, pflow)

I also run a cron job twice an hour to stuff anything trying for obvious 
stupidity like logging in as root or admin get added to the table (some 
handwaving tips at 
https://bsdly.blogspot.com/2017/04/forcing-password-gropers-through.html

- Peter

—
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.




Attachment: signature.asc
Description: Message signed with OpenPGP

Reply via email to