Date: Mon, 15 Mar 1999 10:07:09 +0200 From: Ruslan Ermilov <ru@ucb.crimea.ua> To: geniusj@phoenix.unacom.com Cc: questions@FreeBSD.ORG Subject: Re: SYN attacks Message-ID: <19990315100709.D64525@relay.ucb.crimea.ua> In-Reply-To: <19990314215130.12505.qmail@phoenix.unacom.com>; from geniusj@phoenix.unacom.com on Sun, Mar 14, 1999 at 09:51:30PM -0000 References: <19990314215130.12505.qmail@phoenix.unacom.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, Mar 14, 1999 at 09:51:30PM -0000, geniusj@phoenix.unacom.com wrote: > Hi, if this is directed towards the wrong list, please forward it to the > correct one.. My concern is that our server has been getting some massive > SYN floods from, what we think arespoofed hosts recently. It has brought our > system to its knees, even with its power (Dual 400 512 mb of ram). We would > like to somehow restrict these zombie connections from building up so much > .. I found somewhat of an old kernel patch, but due to the age of it, it isnt > applicable any more. I would like any suggestions on stopping or weakening > these attacks either by kernel patch or ip filtering.. Any suggestions are > welcome. > > Thanks, > Jason DiCioccio <geniusj@unacom.com> man 4 dummynet Cheers, -- Ruslan Ermilov Sysadmin and DBA of the ru@ucb.crimea.ua United Commercial Bank +380.652.247.647 Simferopol, Ukraine http://www.FreeBSD.org The Power To Serve http://www.oracle.com Enabling The Information Age To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19990315100709.D64525>