Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 26 Jul 2021 14:42:38 +0100
From:      Steve O'Hara-Smith <steve@sohara.org>
To:        Norman Gray <gray@nxg.name>
Cc:        FreeBSD Questions <freebsd-questions@freebsd.org>
Subject:   Re: Detecting or mitigating syn-flood attacks
Message-ID:  <20210726144238.2245630e959724dc1df1794e@sohara.org>
In-Reply-To: <57893A91-2180-441F-836F-66EAC526FBB8@nxg.name>
References:  <57893A91-2180-441F-836F-66EAC526FBB8@nxg.name>

next in thread | previous in thread | raw e-mail | index | archive | help

On Mon, 26 Jul 2021 13:59:14 +0100
Norman Gray <gray@nxg.name> wrote:

> 
> Greetings.
> 
> Can anyone point me towards best-practice guidance on detecting and 
> mitigating syn-flood attacks, with a focus on FreeBSD?

	There's a paper on using syncache for the purpose:

https://users.ece.cmu.edu/~adrian/731-sp05/readings/lemon-syn-cache.pdf

	I also see mentions of syncookies in related questions.

-- 
Steve O'Hara-Smith <steve@sohara.org>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20210726144238.2245630e959724dc1df1794e>