Date: Thu, 27 Sep 2001 13:41:57 -0300 From: "Ronan Lucio" <ronan@melim.com.br> To: "Dave" <mudman@R181172.resnet.ucsb.edu> Cc: <freebsd-security@FreeBSD.ORG> Subject: Re: flood attacks Message-ID: <037601c14773$52a23da0$2aa8a8c0@melim.com.br> References: <Pine.BSF.4.33.0109270907350.1695-100000@R181172.resnet.ucsb.edu>
next in thread | previous in thread | raw e-mail | index | archive | help
Hi Dave, But, in my case, I looked at mrtg graphics and saw that it had big flow during 1 hour. So, I supposed to prevent such situation. [ ]īs Ronan Lucio > > Limiting closed port RST response from 1800 to 200 packets per second. > > Awhile back, I managed to reproduce this by portscanning myself with a > very fast scanner which doesn't wait for any kind of response from the > server before testing the next port. The 1800 to 200 message thing sounds > quite general, so you could be getting flooded with lots of different > kinds of data. If the messages come in briefly and then stop for awhile > (rather than a continus flow) you could just be getting a fast port scan. > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-security" in the body of the message > > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?037601c14773$52a23da0$2aa8a8c0>