Date: Mon, 26 Jul 2021 14:42:38 +0100 From: Steve O'Hara-Smith <steve@sohara.org> To: Norman Gray <gray@nxg.name> Cc: FreeBSD Questions <freebsd-questions@freebsd.org> Subject: Re: Detecting or mitigating syn-flood attacks Message-ID: <20210726144238.2245630e959724dc1df1794e@sohara.org> In-Reply-To: <57893A91-2180-441F-836F-66EAC526FBB8@nxg.name> References: <57893A91-2180-441F-836F-66EAC526FBB8@nxg.name>
next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 26 Jul 2021 13:59:14 +0100 Norman Gray <gray@nxg.name> wrote: > > Greetings. > > Can anyone point me towards best-practice guidance on detecting and > mitigating syn-flood attacks, with a focus on FreeBSD? There's a paper on using syncache for the purpose: https://users.ece.cmu.edu/~adrian/731-sp05/readings/lemon-syn-cache.pdf I also see mentions of syncookies in related questions. -- Steve O'Hara-Smith <steve@sohara.org>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20210726144238.2245630e959724dc1df1794e>
