From owner-freebsd-security Wed Feb 26 10:19:03 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id KAA23110 for security-outgoing; Wed, 26 Feb 1997 10:19:03 -0800 (PST) Received: from scruz.net (nic.scruz.net [165.227.1.2]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id KAA23100 for ; Wed, 26 Feb 1997 10:18:59 -0800 (PST) Received: (from simon@localhost) by scruz.net (8.7.3/1.34) id KAA20073; Wed, 26 Feb 1997 10:18:54 -0800 (PST) Date: Wed, 26 Feb 1997 10:18:54 -0800 (PST) From: admin@scruz.net (Simon) Message-Id: <199702261818.KAA20073@scruz.net> X-Authentication-Warning: nic.scruz.net: simon set sender to admin@scruz.net using -f To: security@freebsd.org Subject: [SCZ-34647] Patch for SYN flooding Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk Hi, We're an ISP in Santa Cruz, California that runs FreeBSD on some of our servers. We occaisonally experience unintentional SYN flooding attacks due to uni-directional routing or similar problems. We understand that there is a patch available that adresses the SYN flooding problem. We would like to get information about this patch, what it does, are where we can find it. We'd appreciate any information you can give us. Thanks, Simon scruznet network operations ----------------------------------------------------------------------------- Scruz-Net, Inc. * (800) 319-5555 * (408) 457-5050 * FAX: (408) 457-1020 admin@scruz.net