Date: Mon, 15 Mar 1999 20:21:03 +0200 (EET) From: Evren Yurtesen <yurtesen@ispro.net.tr> To: geniusj@phoenix.unacom.com Cc: questions@FreeBSD.ORG Subject: Re: SYN attacks Message-ID: <Pine.BSF.3.96.990315202051.11242A-100000@turkey.ispro.net.tr> In-Reply-To: <19990314215130.12505.qmail@phoenix.unacom.com>
next in thread | previous in thread | raw e-mail | index | archive | help
I think you may find information at www.cert.org On 14 Mar 1999 geniusj@phoenix.unacom.com wrote: > Hi, if this is directed towards the wrong list, please forward it to the > correct one.. My concern is that our server has been getting some massive > SYN floods from, what we think arespoofed hosts recently. It has brought our > system to its knees, even with its power (Dual 400 512 mb of ram). We would > like to somehow restrict these zombie connections from building up so much > .. I found somewhat of an old kernel patch, but due to the age of it, it isnt > applicable any more. I would like any suggestions on stopping or weakening > these attacks either by kernel patch or ip filtering.. Any suggestions are > welcome. > > Thanks, > Jason DiCioccio <geniusj@unacom.com> > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-questions" in the body of the message > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.990315202051.11242A-100000>