Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 27 Sep 2001 09:10:55 -0700 (PDT)
From:      Dave <mudman@R181172.resnet.ucsb.edu>
To:        Ronan Lucio <ronan@melim.com.br>
Cc:        <freebsd-security@FreeBSD.ORG>
Subject:   Re: flood attacks
Message-ID:  <Pine.BSF.4.33.0109270907350.1695-100000@R181172.resnet.ucsb.edu>
In-Reply-To: <01eb01c14757$f699b580$2aa8a8c0@melim.com.br>

next in thread | previous in thread | raw e-mail | index | archive | help
>     Limiting closed port RST response from 1800 to 200 packets per second.

Awhile back, I managed to reproduce this by portscanning myself with a
very fast scanner which doesn't wait for any kind of response from the
server before testing the next port.  The 1800 to 200 message thing sounds
quite general, so you could be getting flooded with lots of different
kinds of data.  If the messages come in briefly and then stop for awhile
(rather than a continus flow) you could just be getting a fast port scan.


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.33.0109270907350.1695-100000>