On 8/24/06, Ryan Corder <[EMAIL PROTECTED]> wrote:
table <bad_hosts> persist
block in quick on $ext_if inet from <bad_hosts>
pass in on $ext_if proto tcp from any to any port 80 \
flags S/SA synproxy state (max-src-conn 100, \
max-src-conn-rate 15/5, \
overload <bad_hosts> flush)
This works fine in these cases and I've used it before. Run
a cron job to grab and update and flat-file of IP addresses
(<bad_hosts>) on a regular basis. I've managed botnet
attacks just like it with block lists in the hundreds of thousands.
If you are that concerned with aol traffic then just set
another cron to rip out aol address space from the bad_hosts
file.