Date: Sat, 25 Aug 2018 13:54:44 -0700 From: Michael Sierchio <kudzu@tenebras.com> To: FreeBSD Questions <freebsd-questions@freebsd.org> Subject: Re: finding the port for "kernel: Limiting open port RST response from x to y packets/sec" Message-ID: <CAHu1Y70XBNkOehTBnP=VERue6E5shhA46aNN-6qXL7MMkU0r-w@mail.gmail.com> In-Reply-To: <c3a1198f-e786-92c8-f126-db09a511749b@riseup.net> References: <c3a1198f-e786-92c8-f126-db09a511749b@riseup.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, Aug 25, 2018 at 11:34 AM nusenu <nusenu-lists@riseup.net> wrote: > > kernel: Limiting open port RST response from xxxx to yyy packets/sec > Is there a way to find out which specific TCP port is getting hammered > or any other additional debug information related to these log entries? > (the server has multiple open and publicly reachable open TCP ports) > You can identify and log these packets in IPFIREWALL (man ipfw). You can also set sysctl net.inet.tcp.log_debug=3D1 --=20 "Well," Brahma said, "even after ten thousand explanations, a fool is no wiser, but an intelligent person requires only two thousand five hundred." - The Mah=C4=81bh=C4=81rata
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAHu1Y70XBNkOehTBnP=VERue6E5shhA46aNN-6qXL7MMkU0r-w>