Date: Thu, 27 Sep 2001 09:10:55 -0700 (PDT) From: Dave <mudman@R181172.resnet.ucsb.edu> To: Ronan Lucio <ronan@melim.com.br> Cc: <freebsd-security@FreeBSD.ORG> Subject: Re: flood attacks Message-ID: <Pine.BSF.4.33.0109270907350.1695-100000@R181172.resnet.ucsb.edu> In-Reply-To: <01eb01c14757$f699b580$2aa8a8c0@melim.com.br>
next in thread | previous in thread | raw e-mail | index | archive | help
> Limiting closed port RST response from 1800 to 200 packets per second. Awhile back, I managed to reproduce this by portscanning myself with a very fast scanner which doesn't wait for any kind of response from the server before testing the next port. The 1800 to 200 message thing sounds quite general, so you could be getting flooded with lots of different kinds of data. If the messages come in briefly and then stop for awhile (rather than a continus flow) you could just be getting a fast port scan. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.33.0109270907350.1695-100000>