

Ofcourse you would never ever want an automatic IP-blocker on a firewall/gateway connected to a commercial/official site/network, but that is a completely different story and hopefully obvious. Just add an allow rule for these in the top of the pf.conf file and include a "quick" statement and the rest of the rules will be ignored.


You could also specify IP's that always should be able to talk to the firewall. Audience Developers, System Administrators Programming Language C This is an application that can also be fetched from. Hogwash can't stop every attack (nothing can) so we shoot for getting 95 of them out of the way. DESCRIPTION Hogwash is an inline packet scrubber that uses Snorts ( detection engine to drop malicious packets before they reach the target machine. What does that mean Hogwash can detect attacks on your network, and if you want, filter them out. It's simply would (next to) never happen and if you cant access one of your favourite sites, your DNS seems broken or similar you know where to check. Overview Hogwash is an intrusion detection system (IDS)/packet scrubber. For personal internet-use there really isn't a problem with the possibility of DoS. A Perlprogram that clean up the ip's that have been allowed again after being denied could be put in a cronjob to keep the pf.conf file quite clean.Ģ. This will be quite messy in the pf.conf after some time but it's probably the easiest. Then when you want to unblock an ip you just add an allow (pass) statement. Add a deny rule without the "quick" statement at the end of pf.conf. For personal use this kind of ip-blocking isn't a problem.
