From owner-freebsd-chat Sun Mar 2 15:42:57 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id PAA10715 for chat-outgoing; Sun, 2 Mar 1997 15:42:57 -0800 (PST) Received: from crh.cl.msu.edu (crh.cl.msu.edu [35.8.1.24]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id PAA10709 for ; Sun, 2 Mar 1997 15:42:36 -0800 (PST) Received: (from henrich@localhost) by crh.cl.msu.edu (8.8.5/8.8.4) id SAA00836; Sun, 2 Mar 1997 18:42:31 -0500 (EST) From: Charles Henrich Message-Id: <199703022342.SAA00836@crh.cl.msu.edu> Subject: Re: RSA Server down.. router blocking To: marcs@znep.com (Marc Slemko) Date: Sun, 2 Mar 1997 18:42:31 -0500 (EST) Cc: freebsd-chat@freebsd.org In-Reply-To: from Marc Slemko at "Mar 2, 97 04:10:52 pm" X-Mailer: ELM [version 2.4ME+ PL22 (25)] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-chat@freebsd.org X-Loop: FreeBSD.org Precedence: bulk > Umm... sounds more to me like they are continuing to have problems with > SYN flooding, as has been mentioned numerous times. If their server > doesn't have adequate code to deal with them or they fake SYNs are coming > in at too high of a rate, you will get no response to your connection > attempt because the queue of incoming incomplete connections is full with > the fake SYNs. Yea, but that should effect all ports on that system, no? Its only the key port thats seeing this. -Crh Charles Henrich Michigan State University henrich@msu.edu http://pilot.msu.edu/~henrich