Date: Mon, 15 Mar 1999 12:28:48 -0500 (EST) From: The Tech-Admin Dude <geniusj@phoenix.unacom.com> To: Ruslan Ermilov <ru@ucb.crimea.ua> Cc: questions@FreeBSD.ORG Subject: Re: SYN attacks Message-ID: <Pine.BSF.4.10.9903151227140.29462-100000@phoenix.unacom.com> In-Reply-To: <19990315100709.D64525@relay.ucb.crimea.ua>
next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 15 Mar 1999, Ruslan Ermilov wrote: > On Sun, Mar 14, 1999 at 09:51:30PM -0000, geniusj@phoenix.unacom.com wrote: > > Hi, if this is directed towards the wrong list, please forward it to the > > correct one.. My concern is that our server has been getting some massive > > SYN floods from, what we think arespoofed hosts recently. It has brought our > > system to its knees, even with its power (Dual 400 512 mb of ram). We would > > like to somehow restrict these zombie connections from building up so much > > .. I found somewhat of an old kernel patch, but due to the age of it, it isnt > > applicable any more. I would like any suggestions on stopping or weakening > > these attacks either by kernel patch or ip filtering.. Any suggestions are > > welcome. > > > > Thanks, > > Jason DiCioccio <geniusj@unacom.com> > > man 4 dummynet > <SNIP> That looks to be (and as I understood it) for limitting bandwidth going through a certain device, I dont want to llimit overall bandwidth of the system, the SYN attacks dont actually take much bandwidth, but they do take a big chunk of system resources and dont allow anyone else to login while they are going on.. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.10.9903151227140.29462-100000>