Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 8 Nov 1996 10:01:44 -0800 (PST)
From:      "Jonathan M. Bresler" <jmb>
To:        security
Subject:   urgent! SYN packet flood tolerance in 2.1.5? (fwd)
Message-ID:  <199611081801.KAA26411@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help
Ian Kallen wrote:
>From ian@ns1.gamespot.com Thu Nov  7 14:36:56 1996
Message-Id: <199611071325.NAA25683@gamespot.com>
Comments: Authenticated sender is <ian@mail.gamespot.com>
From: "Ian Kallen" <ian@gamespot.com>
To: jmb@freebsd.org
Date: Thu, 7 Nov 1996 12:39:33 +0000
Subject: urgent! SYN packet flood tolerance in 2.1.5?
Reply-to: ian@gamespot.com
CC: jkh@time.freebsd.org
Priority: normal
X-mailer: Pegasus Mail for Windows (v2.23)

I saw mention of updates to some of the source and headers for 
2.2-current that should provide better SYN flood tolerance.  Is there 
anyway/recipe that you know of to implement these fixes in 2.1.5?  
I know that DEC and BSDi and others have been publishing patches and 
kernel reconfigs to "harden" their kernels.
One of my machines (ftp.gamespot.com) has been under attack with 
floods to port 21, the originating IP address is presently filtered 
at the router but that filter is going to have to come down.  
Besides, the originator might switch IP addresses soon.  Anyway, if 
you have any suggestions for getting this patched without going to 
the 2.2 branch, I'd really appreciate it.

thanks much in advance
--
Ian Kallen                           ian@gamespot.com
     Director of Technology & Web Administration
            http://www.gamespot.com


-- 
Jonathan M. Bresler           FreeBSD Postmaster             jmb@FreeBSD.ORG
FreeBSD--4.4BSD Unix for PC clones, source included. http://www.freebsd.org/
PGP 2.6.2 Fingerprint:      31 57 41 56 06 C1 40 13  C5 1C E3 E5 DC 62 0E FB



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199611081801.KAA26411>