-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Saturday, 2009-10-03 at 18:36 +0200, Per Jessen wrote:
Yeah, I have similar rules on all of my systems, but like I said, this attack appears to be specifically designed to circumvent that type of protection.
The defense would have to be collaborative. Machines being attacked would have to report the IPs the attacks seem to come from to a central server, which would distribute the data to the protected "clients", who would then block the entire list. Another approach, if you don't expect connections from, say, China, would be to block based on geoip information. - -- Cheers, Carlos E. R. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.9 (GNU/Linux) iEYEARECAAYFAkrHgLAACgkQtTMYHG2NR9U8ngCcCtwkhaswL0d4LRHpYNj+0mfU 9ocAn3d4SjuMO9jcW6ihBkXMl6jYIpjX =TdLu -----END PGP SIGNATURE----- -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org For additional commands, e-mail: opensuse+help@opensuse.org