Date: Fri, 8 Nov 1996 10:01:44 -0800 (PST) From: "Jonathan M. Bresler" <jmb> To: security Subject: urgent! SYN packet flood tolerance in 2.1.5? (fwd) Message-ID: <199611081801.KAA26411@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
Ian Kallen wrote: >From ian@ns1.gamespot.com Thu Nov 7 14:36:56 1996 Message-Id: <199611071325.NAA25683@gamespot.com> Comments: Authenticated sender is <ian@mail.gamespot.com> From: "Ian Kallen" <ian@gamespot.com> To: jmb@freebsd.org Date: Thu, 7 Nov 1996 12:39:33 +0000 Subject: urgent! SYN packet flood tolerance in 2.1.5? Reply-to: ian@gamespot.com CC: jkh@time.freebsd.org Priority: normal X-mailer: Pegasus Mail for Windows (v2.23) I saw mention of updates to some of the source and headers for 2.2-current that should provide better SYN flood tolerance. Is there anyway/recipe that you know of to implement these fixes in 2.1.5? I know that DEC and BSDi and others have been publishing patches and kernel reconfigs to "harden" their kernels. One of my machines (ftp.gamespot.com) has been under attack with floods to port 21, the originating IP address is presently filtered at the router but that filter is going to have to come down. Besides, the originator might switch IP addresses soon. Anyway, if you have any suggestions for getting this patched without going to the 2.2 branch, I'd really appreciate it. thanks much in advance -- Ian Kallen ian@gamespot.com Director of Technology & Web Administration http://www.gamespot.com -- Jonathan M. Bresler FreeBSD Postmaster jmb@FreeBSD.ORG FreeBSD--4.4BSD Unix for PC clones, source included. http://www.freebsd.org/ PGP 2.6.2 Fingerprint: 31 57 41 56 06 C1 40 13 C5 1C E3 E5 DC 62 0E FB
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199611081801.KAA26411>