From owner-freebsd-security Thu Sep 12 15:16:07 1996 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.7.5/8.7.3) id PAA07276 for security-outgoing; Thu, 12 Sep 1996 15:16:07 -0700 (PDT) Received: from glacier.cold.org (glacier.sunrem.com [206.81.134.54]) by freefall.freebsd.org (8.7.5/8.7.3) with ESMTP id PAA07245 for ; Thu, 12 Sep 1996 15:16:01 -0700 (PDT) Received: (from brandon@localhost) by glacier.cold.org (8.7.5/8.7.3) id QAA05602; Thu, 12 Sep 1996 16:16:52 -0600 (MDT) Date: Thu, 12 Sep 1996 16:16:51 -0600 (MDT) From: Brandon Gillespie To: freebsd-security@freebsd.org Subject: SYN attacks Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-security@freebsd.org X-Loop: FreeBSD.org Precedence: bulk I am basically without knowledge in regard to TCP protocols. What I'm wondering is how succeptible FreeBSD is to the SYN flooding attacks like those that took down panix.com? A patch to the linux kernel came out in the magazine '2600' which enabled one to do the SYN flooding, so I suspect its going to become more common. Somebody mentioned a patch for BSD style kernels from Avi Freedman of NetAxs.com. ? -Brandon Gillespie