Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 25 Aug 2018 13:54:44 -0700
From:      Michael Sierchio <kudzu@tenebras.com>
To:        FreeBSD Questions <freebsd-questions@freebsd.org>
Subject:   Re: finding the port for "kernel: Limiting open port RST response from x to y packets/sec"
Message-ID:  <CAHu1Y70XBNkOehTBnP=VERue6E5shhA46aNN-6qXL7MMkU0r-w@mail.gmail.com>
In-Reply-To: <c3a1198f-e786-92c8-f126-db09a511749b@riseup.net>
References:  <c3a1198f-e786-92c8-f126-db09a511749b@riseup.net>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, Aug 25, 2018 at 11:34 AM nusenu <nusenu-lists@riseup.net> wrote:

>
> kernel: Limiting open port RST response from xxxx to yyy packets/sec



> Is there a way to find out which specific TCP port is getting hammered
> or any other additional debug information related to these log entries?
> (the server has multiple open and publicly reachable open TCP ports)
>

You can identify and log these packets in IPFIREWALL (man ipfw).

You can also set  sysctl net.inet.tcp.log_debug=3D1
--=20
"Well," Brahma said, "even after ten thousand explanations, a fool is no
wiser, but an intelligent person requires only two thousand five hundred."

- The Mah=C4=81bh=C4=81rata



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAHu1Y70XBNkOehTBnP=VERue6E5shhA46aNN-6qXL7MMkU0r-w>