On Mon, Jun 28, 2021 at 06:38:21PM +0200, Matthieu Herrb wrote:
> I have rules like this one on the firewalls I manage:
> 
> pass in on $in_if proto tcp from any to <sshservers> port ssh \
>         flags S/SA keep state \
>         (source-track rule, max-src-states 30, max-src-conn 20, \
>       max-src-conn-rate 15/30, overload <ssh-bruteforce> flush
>         global)
> 
> block log from <ssh-bruteforce>
> 
> However some legitimate remote users get their addresses added to the
> ssh-bruteforce table from time to time.
> 
> I'd like to be able to figure out the reason (ie which condtion
> triggers the overload). Is there a way to have it logged somewhere
> that I'm missing ?

`set debug notice' should syslog(3) addresses being overloaded in the
first place, but I'm fairly certain there is currently no way to get
more than that.

Reply via email to