From owner-freebsd-questions Mon Mar 15 10:24: 3 1999 Delivered-To: freebsd-questions@freebsd.org Received: from turkey.ispro.net.tr (turkey.ispro.net.tr [195.174.18.2]) by hub.freebsd.org (Postfix) with ESMTP id DBD0714BE9 for ; Mon, 15 Mar 1999 10:23:59 -0800 (PST) (envelope-from yurtesen@ispro.net.tr) Received: from localhost (yurtesen@localhost) by turkey.ispro.net.tr (8.8.8/8.8.8) with SMTP id UAA11244; Mon, 15 Mar 1999 20:21:03 +0200 (EET) (envelope-from yurtesen@ispro.net.tr) X-Authentication-Warning: turkey.ispro.net.tr: yurtesen owned process doing -bs Date: Mon, 15 Mar 1999 20:21:03 +0200 (EET) From: Evren Yurtesen To: geniusj@phoenix.unacom.com Cc: questions@FreeBSD.ORG Subject: Re: SYN attacks In-Reply-To: <19990314215130.12505.qmail@phoenix.unacom.com> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG I think you may find information at www.cert.org On 14 Mar 1999 geniusj@phoenix.unacom.com wrote: > Hi, if this is directed towards the wrong list, please forward it to the > correct one.. My concern is that our server has been getting some massive > SYN floods from, what we think arespoofed hosts recently. It has brought our > system to its knees, even with its power (Dual 400 512 mb of ram). We would > like to somehow restrict these zombie connections from building up so much > .. I found somewhat of an old kernel patch, but due to the age of it, it isnt > applicable any more. I would like any suggestions on stopping or weakening > these attacks either by kernel patch or ip filtering.. Any suggestions are > welcome. > > Thanks, > Jason DiCioccio > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-questions" in the body of the message > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message