I've
got a kernel message
Limiting closed port RST response from N to 200 packets/sec
where N 200. The problem is that it doesn't say which port was
involved. Is there any way to find that out so I can try tracking down
the problem? AFAICT tcpdump
Every once in a while the nightly periodic security checks tell me I've
got a kernel message
Limiting closed port RST response from N to 200 packets/sec
where N 200. The problem is that it doesn't say which port was
involved. Is there any way to find that out so I can try tracking down
In freebsd-questions Digest, Vol 413, Issue 4, Message: 7
On Tue, 01 May 2012 12:59:36 +0100 Arthur Chance free...@qeng-ho.org wrote:
Every once in a while the nightly periodic security checks tell me I've
got a kernel message
Limiting closed port RST response from N to 200 packets/sec
Hi there,
I'm getting a lot of these in my security output.
Limiting closed port RST response from 220 to 200 packets per second
They are always on ports between 200- 300.
Could this be a DOS atttack?
Where do I find a more detailed log?
I'm running FreeBSD 4.8 Release - the box is basically
On Fri, Jun 20, 2003 at 09:55:19AM +0100, Matthew Ryan wrote:
Could this be a DOS atttack?
It could be, but more likely it's someone trying to determine what ports
are open with a tool such as nmap.
Where do I find a more detailed log?
Configure a firewall such as ipf and make sure you opt to
Matthew Ryan wrote:
[ ... ]
I'm getting a lot of these in my security output.
Limiting closed port RST response from 220 to 200 packets per second
They are always on ports between 200- 300.
Could this be a DOS atttack?
Where do I find a more detailed log?
Typically, this indicates that someone