Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 27 Sep 2001 13:41:57 -0300
From:      "Ronan Lucio" <ronan@melim.com.br>
To:        "Dave" <mudman@R181172.resnet.ucsb.edu>
Cc:        <freebsd-security@FreeBSD.ORG>
Subject:   Re: flood attacks
Message-ID:  <037601c14773$52a23da0$2aa8a8c0@melim.com.br>
References:  <Pine.BSF.4.33.0109270907350.1695-100000@R181172.resnet.ucsb.edu>

next in thread | previous in thread | raw e-mail | index | archive | help
Hi Dave,

But, in my case, I looked at mrtg graphics and saw that
it had big flow during 1 hour.
So, I supposed to prevent such situation.

[ ]īs

Ronan Lucio

> >     Limiting closed port RST response from 1800 to 200 packets per
second.
>
> Awhile back, I managed to reproduce this by portscanning myself with a
> very fast scanner which doesn't wait for any kind of response from the
> server before testing the next port.  The 1800 to 200 message thing sounds
> quite general, so you could be getting flooded with lots of different
> kinds of data.  If the messages come in briefly and then stop for awhile
> (rather than a continus flow) you could just be getting a fast port scan.
>
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
>
>


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?037601c14773$52a23da0$2aa8a8c0>