You can throttle connections with PF. If I remember correctly the man page has some nice examples. But besides that there isn't much you can do since you don't know in advance where the attacks will come from. All you can do is react after the fact.UNIXgod said:Is there a quicker way to populate the table without parsing the log?
UNIXgod said:So the proper way would to have a dedicated pf/gateway I assume.
table <webddos> persist
block log quick inet from <webddos>
pass in on $ext_if inet proto tcp from any to $webserver port { 80 443 } synproxy state \
( max-src-conn-rate 100/60, overload <webddos> flush global )
@weekly /sbin/pfctl -t webddos -T expire 60