Date: Thu, 31 May 2001 21:20:25 +0200 From: "Liran Dahan" <lirandb@netvision.net.il> To: <freebsd-security@freebsd.org> Subject: Limiting TCP RST Response Packets Message-ID: <000a01c0ea06$be934600$b88f39d5@a>
next in thread | raw e-mail | index | archive | help
[-- Attachment #1 --] Im afarid of someone trying to flood me by Connecting to me 1000 times and for every time like that it will send TCP Rst Reponse. Is there any way to Limit TCP Rst Response packets? Is there a way to Limit Unreach Messages (IPFW) that it wont flood me too ? -Liran Dahan- (lirandb@netvision.net.il) [-- Attachment #2 --] <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> <HTML><HEAD> <META content="text/html; charset=windows-1255" http-equiv=Content-Type> <META content="MSHTML 5.00.2919.6307" name=GENERATOR> <STYLE></STYLE> </HEAD> <BODY bgColor=#ffffff> <DIV><FONT face=Arial size=2>Im afarid of someone trying to flood me by Connecting to me 1000 times and for every time like that it will send TCP Rst Reponse.</FONT></DIV> <DIV><FONT face=Arial size=2>Is there any way to Limit TCP Rst Response packets? </FONT></DIV> <DIV><FONT face=Arial size=2>Is there a way to Limit Unreach Messages (IPFW) that it wont flood me too ?</FONT></DIV> <DIV> </DIV> <DIV><FONT face=Arial size=2>-Liran Dahan- (<A href="mailto:lirandb@netvision.net.il">lirandb@netvision.net.il</A>)</FONT></DIV></BODY></HTML>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?000a01c0ea06$be934600$b88f39d5>
