Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 13 May 1999 18:27:13 -0700 (PDT)
From:      Thamer Al-Herbish <shadows@whitefang.com>
To:        security@FreeBSD.ORG
Subject:   Re: Forwarded from BUGTRAQ: SYN floods against FreeBSD
Message-ID:  <Pine.BSF.4.05.9905131824250.267-100000@rage.whitefang.com>
In-Reply-To: <4.2.0.37.19990513161529.00c1e3f0@localhost>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 13 May 1999, Brett Glass wrote:

> available (default to 100). This is the maximium number of SYNs per second
> that will be processed, the rest will be silently discarded. On my test

If I'm reading this correctly, it would not be very effective. I
believe the OpenBSD fix was to randomly drop ports per a syn flooded
port. So it would be "fair." Dropping all SYNs after a number of SYNs
come in seems to be counter productive.

Or does this actually work?

--
Thamer Al-Herbish                     PGP public key:
shadows@whitefang.com                 http://www.whitefang.com/pgpkey.txt
[ The Secure UNIX Programming FAQ     http://www.whitefang.com/sup/  ]



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.05.9905131824250.267-100000>