Current-Users archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: DoS attack against TCP services
In article <Pine.NEB.4.64.1502041602460.812%6bone.informatik.uni-leipzig.de@localhost>,
<6bone%6bone.informatik.uni-leipzig.de@localhost> wrote:
>Hello,
>
>The problem occurred again. The kernel has over 3,000 connections in
>TIME_WAIT state. The compounds are after an hour wait not disappeared.
>There are more and more connections in the TIME_WAIT state. My settings
>are:
>
>net.inet.tcp.mslt.enable = 1
>net.inet.tcp.mslt.loopback = 2
>net.inet.tcp.mslt.local = 10
>net.inet.tcp.mslt.remote = 60
>net.inet.tcp.mslt.remote_threshold = 6
>
>The last few times I have restarted the server in order to solve the
>problem. Frequent reboots but very inconvenient for a server.
>
>Does anyone have instructions what information I can still gather to post
>a bug report? The statement "connections in the TIME_WAIT status are not
>degraded" are probably not sufficient to find the problem.
>
>
>Thank you for your efforts
Can you find what daemon/process is being connected to and from where?
christos
Home |
Main Index |
Thread Index |
Old Index