Darrin Chandler <[EMAIL PROTECTED]> writes:

> Depending on the traffic patterns of legit vs. attack the following idea
> might work... use max-src-* with values that may create false positives
> and overload into table <candidates> which will still PASS. Now use
> different values for max-src-* on <candidate> pass rule to look for
> longer term abuse and overload to <blocked>. Effectively this lets you
> do 2 stages of evaluation, at the price of taking a bit longer to block
> attacks. Make sense?

That's what I call an excellent idea.  Finding the right set of values
is a worthy excercise for the reader, but I *like* that approach.

- P
-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.

Reply via email to