From owner-freebsd-questions Sun Mar 14 13:52: 2 1999 Delivered-To: freebsd-questions@freebsd.org Received: from phoenix.unacom.com (phoenix.unacom.com [209.51.241.25]) by hub.freebsd.org (Postfix) with SMTP id DEA0B15830 for ; Sun, 14 Mar 1999 13:51:56 -0800 (PST) (envelope-from geniusj@phoenix.unacom.com) Received: (qmail 12506 invoked by uid 1000); 14 Mar 1999 21:51:30 -0000 Date: 14 Mar 1999 21:51:30 -0000 Message-ID: <19990314215130.12505.qmail@phoenix.unacom.com> From: geniusj@phoenix.unacom.com To: questions@FreeBSD.org Subject: SYN attacks Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG Hi, if this is directed towards the wrong list, please forward it to the correct one.. My concern is that our server has been getting some massive SYN floods from, what we think arespoofed hosts recently. It has brought our system to its knees, even with its power (Dual 400 512 mb of ram). We would like to somehow restrict these zombie connections from building up so much .. I found somewhat of an old kernel patch, but due to the age of it, it isnt applicable any more. I would like any suggestions on stopping or weakening these attacks either by kernel patch or ip filtering.. Any suggestions are welcome. Thanks, Jason DiCioccio To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message