From owner-freebsd-security Sat Apr 8 09:55:36 1995 Return-Path: security-owner Received: (from majordom@localhost) by freefall.cdrom.com (8.6.10/8.6.6) id JAA18560 for security-outgoing; Sat, 8 Apr 1995 09:55:36 -0700 Received: from ns1.win.net (ns1.win.net [204.215.209.3]) by freefall.cdrom.com (8.6.10/8.6.6) with ESMTP id JAA18554 for ; Sat, 8 Apr 1995 09:55:34 -0700 Received: (from bugs@localhost) by ns1.win.net (8.6.9/8.6.9) id MAA29650 for freebsd-security@freebsd.org; Sat, 8 Apr 1995 12:58:57 -0400 From: Mark Hittinger Message-Id: <199504081658.MAA29650@ns1.win.net> Subject: satan "heavy" mode attacks To: freebsd-security@FreeBSD.org Date: Sat, 8 Apr 1995 12:58:56 -0400 (EDT) X-Mailer: ELM [version 2.4 PL23] Content-Type: text Content-Length: 416 Sender: security-owner@FreeBSD.org Precedence: bulk I've just read that some sites are reporting that using satan in its "heavy" mode will overload an inetd and make it toss its cookies. There are reports that the activity also causes some firewall products to consume available memory and discontinue logging some things. We probably need to double check our inetd and make sure it can deal with the resource overload issue. Regards, Mark Hittinger bugs@win.net