From: Mij <mi...@bi...> - 2007-12-16 15:19:41
|
On 12/dic/07, at 17:00, Ryan Phillips wrote: > On Dec 12, 2007 9:54 AM, Ryan Phillips <tro...@gm...> wrote: >> On Dec 12, 2007 9:11 AM, Ryan Phillips <tro...@gm...> wrote: >>> Hi All, >>> >>> I have been using the pre-1.0 release perfectly fine, but something >>> broke with the latest ports update to 1.0. It doesn't appear that a >>> user is getting blocked by the firewall. >>> >>> Any help would be appreciated. >>> >> >> Sorry for the noise... SSH was listening on all interfaces and the pf >> rule only blocked on one. >> >> For historical sake: block in quick from <sshguard> to any > > I guess the 'on' directive would have taken care of that scenario. > I'm a newb with pf. > > Any comments with this problem would be appreciated. "on $ext_if" matches all the traffic coming in to the ext_if physical interface, so yes, in case that you have multiple addressess assigned to one physical interface. If instead ssh is reachable from different addressess on different interfaces, "on" is just a limitation, and you should instead use something like block in quick from <sshguard> to any port 22 label "ssh bruteforce" or use multiple rules with "on $intrf" for every external interface. The advantage of using "on $interface" is that you protect LAN addresses from being blocked, even if they behave like attackers. Of course this can be managed by sshguard itself with whitelisting anyway. |