But what benefit do you expect to get when you block it via a
max-src-conn-rate/overload rule or directly via a (default) block rule?
In either way you will block the packet.

On Fri, 2008-02-29 at 16:49 -0300, Vinicius Vianna wrote:
> The problem is that these attacks aren't on any pass rule, they are on 
> ports that my firewall doesn't permit, so the packet will go to the 
> block rule, and i can't use these overload rules with block can I?
> 
> Lars NoodC)n wrote:
> > Vinicius Vianna wrote:
> >
> >> I got a firewall with openbsd 4.1 and pf and it's receiving a lot of 
> >> syn floods attacks and even udp floods,...
> >     pass in on $ext_if proto tcp to ($ext_if) port ssh \
> >     flags S/SA keep state \
> >      (max-src-conn 3, max-src-conn-rate 3/60, overload \
> >     <ssh-bruteforce> flush global) \
> >      label BLOCKBRUTES
> >
> > Regards,
> > -Lars

Reply via email to