Date: Thu, 13 May 1999 18:27:13 -0700 (PDT) From: Thamer Al-Herbish <shadows@whitefang.com> To: security@FreeBSD.ORG Subject: Re: Forwarded from BUGTRAQ: SYN floods against FreeBSD Message-ID: <Pine.BSF.4.05.9905131824250.267-100000@rage.whitefang.com> In-Reply-To: <4.2.0.37.19990513161529.00c1e3f0@localhost>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 13 May 1999, Brett Glass wrote: > available (default to 100). This is the maximium number of SYNs per second > that will be processed, the rest will be silently discarded. On my test If I'm reading this correctly, it would not be very effective. I believe the OpenBSD fix was to randomly drop ports per a syn flooded port. So it would be "fair." Dropping all SYNs after a number of SYNs come in seems to be counter productive. Or does this actually work? -- Thamer Al-Herbish PGP public key: shadows@whitefang.com http://www.whitefang.com/pgpkey.txt [ The Secure UNIX Programming FAQ http://www.whitefang.com/sup/ ] To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.05.9905131824250.267-100000>