From owner-freebsd-security Mon Sep 23 03:30:20 1996 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id DAA20845 for security-outgoing; Mon, 23 Sep 1996 03:30:20 -0700 (PDT) Received: from gw.softec.sk (gw.softec.sk [194.196.214.34]) by freefall.freebsd.org (8.7.5/8.7.3) with SMTP id DAA20807 for ; Mon, 23 Sep 1996 03:30:08 -0700 (PDT) Received: (from mail@localhost) by gw.softec.sk (8.6.12/8.6.12) id MAA03236 for ; Mon, 23 Sep 1996 12:27:47 +0200 Received: from softec.softec.sk(193.87.236.1) by gw.softec.sk via smap (V1.3) id sma003231; Mon Sep 23 12:27:25 1996 Received: from kamila.softec.sk by softec.softec.sk id aa15900; 23 Sep 96 12:21 CET Received: by kamila.softec.sk with SMTP (Microsoft Exchange Server Internet Mail Connector Version 4.0.993.5) id <01BBA94A.B2AEBA10@kamila.softec.sk>; Mon, 23 Sep 1996 12:28:17 +0200 Message-ID: From: "Basti, Zoltan" To: "'freebsd-security@freebsd.org'" Subject: SYN attack detection Date: Mon, 23 Sep 1996 12:28:16 +0200 X-Mailer: Microsoft Exchange Server Internet Mail Connector Version 4.0.993.5 Encoding: 17 TEXT Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk Paul Traina in his announcement about the recent SYN flooding attack writes that the command % netstat -s | grep "listen queue overflows" will help attack detection. I'm running FreeBSD 2.1.0-RELEASE and don't seem to have 'listen queue overflows' in netstat -s. Is this in newer releases only or what am i missing? Thank you, -- Zoltan Basti