Delete sysmon? (was Re: DoS attack against TCP services)

2015-03-13 Thread Paul Goyette
On Fri, 13 Mar 2015, Thor Lancelot Simon wrote: < <> A cursory review from here looks like sysmon should be deleted. Yeah, sysmon really is pretty ugly. But it does work (more-or-less) and we don't have any proposals for an alternative sensor monitoring sub-system.

Re: DoS attack against TCP services

2015-03-13 Thread Thor Lancelot Simon
On Sat, Mar 14, 2015 at 06:53:51AM +0800, Paul Goyette wrote: > On Fri, 13 Mar 2015, Christos Zoulas wrote: > > >On Mar 13, 6:32pm, hann...@eis.cs.tu-bs.de ("J. Hannken-Illjes") wrote: > >-- Subject: Re: DoS attack against TCP services > > > >| What about

Re: DoS attack against TCP services

2015-03-13 Thread Christos Zoulas
On Mar 14, 6:53am, p...@vps1.whooppee.com (Paul Goyette) wrote: -- Subject: Re: DoS attack against TCP services | A cursory review from here also looks good. I would use log(LOG_WARNING, instead of printf... christos

Re: DoS attack against TCP services

2015-03-13 Thread Paul Goyette
On Fri, 13 Mar 2015, Christos Zoulas wrote: On Mar 13, 6:32pm, hann...@eis.cs.tu-bs.de ("J. Hannken-Illjes") wrote: -- Subject: Re: DoS attack against TCP services | What about the attached diff. It adds a counter of busy items and | stops enqueueing more work if an item is

Re: DoS attack against TCP services

2015-03-13 Thread Christos Zoulas
On Mar 13, 6:32pm, hann...@eis.cs.tu-bs.de ("J. Hannken-Illjes") wrote: -- Subject: Re: DoS attack against TCP services | What about the attached diff. It adds a counter of busy items and | stops enqueueing more work if an item is still busy. | | Adds a short time lock to protect th

Re: DoS attack against TCP services

2015-03-13 Thread J. Hannken-Illjes
On 13 Mar 2015, at 16:33, Christos Zoulas wrote: > On Mar 13, 4:12pm, hann...@eis.cs.tu-bs.de ("J. Hannken-Illjes") wrote: > -- Subject: Re: DoS attack against TCP services > > | > Can't it just try to acquire the lock and if it fails it spams, and > | &g

Re: DoS attack against TCP services

2015-03-13 Thread Christos Zoulas
On Mar 13, 4:12pm, hann...@eis.cs.tu-bs.de ("J. Hannken-Illjes") wrote: -- Subject: Re: DoS attack against TCP services | > Can't it just try to acquire the lock and if it fails it spams, and | > does not deadlock? Or even better, finds the driver that blocks it, | > and

Re: DoS attack against TCP services

2015-03-13 Thread J. Hannken-Illjes
On 13 Mar 2015, at 14:57, Christos Zoulas wrote: > On Mar 13, 1:08pm, hann...@eis.cs.tu-bs.de ("J. Hannken-Illjes") wrote: > -- Subject: Re: DoS attack against TCP services > > | This was just an idea ... Maybe > | > | ...xs..timeout * sc->maxunits + 10 > |

Re: DoS attack against TCP services

2015-03-13 Thread Christos Zoulas
On Mar 13, 1:08pm, hann...@eis.cs.tu-bs.de ("J. Hannken-Illjes") wrote: -- Subject: Re: DoS attack against TCP services | This was just an idea ... Maybe | | ...xs..timeout * sc->maxunits + 10 | | and set xs timeout to 1 .. 5 seconds? | | I don't think it is possible to make

Re: DoS attack against TCP services

2015-03-13 Thread J. Hannken-Illjes
On 13 Mar 2015, at 13:03, Christos Zoulas wrote: > On Mar 13, 1:00pm, hann...@eis.cs.tu-bs.de ("J. Hannken-Illjes") wrote: > -- Subject: Re: DoS attack against TCP services > > | This would be simple, changing dev/ic/ciss.c like: > | > | sc->sc_sm

Re: DoS attack against TCP services

2015-03-13 Thread Christos Zoulas
On Mar 13, 1:00pm, hann...@eis.cs.tu-bs.de ("J. Hannken-Illjes") wrote: -- Subject: Re: DoS attack against TCP services | This would be simple, changing dev/ic/ciss.c like: | | sc->sc_sme->sme_name =3D device_xname(sc->sc_dev); | sc->sc_sme->sme_co

Re: DoS attack against TCP services

2015-03-13 Thread J. Hannken-Illjes
On 13 Mar 2015, at 12:53, Christos Zoulas wrote: > On Mar 13, 11:19am, hann...@eis.cs.tu-bs.de ("J. Hannken-Illjes") wrote: > -- Subject: Re: DoS attack against TCP services > > | The mutex involved is the sme_mtx protecting the struct sysmon_envsys, so > | our problem

Re: DoS attack against TCP services

2015-03-13 Thread Christos Zoulas
On Mar 13, 11:19am, hann...@eis.cs.tu-bs.de ("J. Hannken-Illjes") wrote: -- Subject: Re: DoS attack against TCP services | The mutex involved is the sme_mtx protecting the struct sysmon_envsys, so | our problem doesn't come from missing POLL. That's what I thought. | We al

Re: DoS attack against TCP services

2015-03-13 Thread J. Hannken-Illjes
On 12 Mar 2015, at 20:59, Christos Zoulas wrote: > | > | Now we have a deadlock, softlck/0 waits for the mutex and therefore > | > | callouts will no longer be processed and ciss holds the mutex and waits > | > | for a callout through cv_timedwait. > | > | > Thanks for looking into it! Part of th

Re: DoS attack against TCP services

2015-03-12 Thread Christos Zoulas
On Mar 12, 8:28pm, hann...@eis.cs.tu-bs.de ("J. Hannken-Illjes") wrote: -- Subject: Re: DoS attack against TCP services | Looks like you made it worse. | | "tick" is constant, for HZ == 100 it is 1 so you now have | | etick = tick + tohz -> etick = 100

Re: DoS attack against TCP services

2015-03-12 Thread J. Hannken-Illjes
On 12 Mar 2015, at 20:00, Christos Zoulas wrote: > On Mar 12, 12:20pm, hann...@eis.cs.tu-bs.de ("J. Hannken-Illjes") wrote: > -- Subject: Re: DoS attack against TCP services > > | Now we have a deadlock, softlck/0 waits for the mutex and therefore > | callouts will n

Re: DoS attack against TCP services

2015-03-12 Thread Christos Zoulas
On Mar 12, 12:20pm, hann...@eis.cs.tu-bs.de ("J. Hannken-Illjes") wrote: -- Subject: Re: DoS attack against TCP services | Now we have a deadlock, softlck/0 waits for the mutex and therefore | callouts will no longer be processed and ciss holds the mutex and waits | for a callo

Re: DoS attack against TCP services

2015-03-12 Thread J. Hannken-Illjes
On 28 Feb 2015, at 21:05, Christos Zoulas wrote: > On Feb 28, 8:26pm, 6b...@6bone.informatik.uni-leipzig.de > (6b...@6bone.informatik.uni-leipzig.de) wrote: > -- Subject: Re: DoS attack against TCP services > > | On Sat, 28 Feb 2015, Christos Zoulas wrote: > | > > | &g

Re: DoS attack against TCP services

2015-02-28 Thread Christos Zoulas
On Feb 28, 8:26pm, 6b...@6bone.informatik.uni-leipzig.de (6b...@6bone.informatik.uni-leipzig.de) wrote: -- Subject: Re: DoS attack against TCP services | On Sat, 28 Feb 2015, Christos Zoulas wrote: | > | > Yes, that's a good start but we need to find which process that | >

Re: DoS attack against TCP services

2015-02-28 Thread 6bone
On Sat, 28 Feb 2015, Christos Zoulas wrote: Yes, that's a good start but we need to find which process that lwp belongs to. I'm not sure what the best course of action is. The machine is still running. Should you try to get the information from the current system or force a dump and analyze

Re: DoS attack against TCP services

2015-02-28 Thread Christos Zoulas
On Feb 28, 7:39pm, 6b...@6bone.informatik.uni-leipzig.de (6b...@6bone.informatik.uni-leipzig.de) wrote: -- Subject: Re: DoS attack against TCP services | On Sat, 28 Feb 2015, J. Hannken-Illjes wrote: | > | > This one looks bad. Which thread holds proc_lock? | > | | Helps this? |

Re: DoS attack against TCP services

2015-02-28 Thread J. Hannken-Illjes
On 28 Feb 2015, at 19:39, 6b...@6bone.informatik.uni-leipzig.de wrote: > On Sat, 28 Feb 2015, J. Hannken-Illjes wrote: >> >> This one looks bad. Which thread holds proc_lock? >> > > Helps this? > > https://www.ipv6.uni-leipzig.de/proc_lock.png Looks unlocked -- what about a backtrace of thre

Re: DoS attack against TCP services

2015-02-28 Thread 6bone
On Sat, 28 Feb 2015, J. Hannken-Illjes wrote: This one looks bad. Which thread holds proc_lock? Helps this? https://www.ipv6.uni-leipzig.de/proc_lock.png Regards Uwe

Re: DoS attack against TCP services

2015-02-28 Thread J. Hannken-Illjes
On 28 Feb 2015, at 18:20, 6b...@6bone.informatik.uni-leipzig.de wrote: > On Sat, 28 Feb 2015, Christos Zoulas wrote: > >> Good idea. You can use crash, ps and see what each process is holding... >> >> christos > > Here the output from crash and ps > > gate# crash > Crash version 7.0_BETA, imag

Re: DoS attack against TCP services

2015-02-28 Thread 6bone
On Sat, 28 Feb 2015, Christos Zoulas wrote: Good idea. You can use crash, ps and see what each process is holding... christos Here the output from crash and ps gate# crash Crash version 7.0_BETA, image version 7.99.5. WARNING: versions differ, you may not be able to examine this image. Outpu

Re: DoS attack against TCP services

2015-02-28 Thread Christos Zoulas
On Feb 28, 4:46pm, hann...@eis.cs.tu-bs.de ("J. Hannken-Illjes") wrote: -- Subject: Re: DoS attack against TCP services | Anyone holding "proc_lock"? I had a similar problem with fstrans where | it was a deadlock with proc_lock preventing timer_intr() to succeed and |

Re: DoS attack against TCP services

2015-02-28 Thread J. Hannken-Illjes
On 28 Feb 2015, at 16:28, Christos Zoulas wrote: > On Feb 28, 11:37am, 6b...@6bone.informatik.uni-leipzig.de > (6b...@6bone.informatik.uni-leipzig.de) wrote: > -- Subject: Re: DoS attack against TCP services > > | On Fri, 13 Feb 2015, Christos Zoulas wrote: > | > | &

Re: DoS attack against TCP services

2015-02-28 Thread Christos Zoulas
On Feb 28, 11:37am, 6b...@6bone.informatik.uni-leipzig.de (6b...@6bone.informatik.uni-leipzig.de) wrote: -- Subject: Re: DoS attack against TCP services | On Fri, 13 Feb 2015, Christos Zoulas wrote: | | > I tried adding "show callout" to crash(8) but it is not useful because the

Re: DoS attack against TCP services

2015-02-28 Thread 6bone
On Fri, 13 Feb 2015, Christos Zoulas wrote: I tried adding "show callout" to crash(8) but it is not useful because the pointers move too quickly. OTOH, next time this happens you can enter ddb on your machine and type "show callout" and see if that sheds any light to the expired and not fired ca

Re: DoS attack against TCP services

2015-02-13 Thread Christos Zoulas
In article , <6b...@6bone.informatik.uni-leipzig.de> wrote: > >The callout code in kern_timeout.c: > > if (delta <0) > cc->cc_ev_late.ev_count++; > >At the same time, the problem occurs that expired entries are not deleted >from the ndp table. 'ndp -a' sho

Re: DoS attack against TCP services

2015-02-13 Thread 6bone
On Wed, 4 Feb 2015, Sverre Froyen wrote: I'd also look at the open descriptors of the named process (although they should be closed at this time, since TIME_WAIT means closed on this side, and waiting for the 4 minutes to expire before killing the connection)... Also I'd record that information

Re: DoS attack against TCP services

2015-02-09 Thread Sverre Froyen
> On 2015-02-04, at 13:08, 6b...@6bone.informatik.uni-leipzig.de wrote: > > I picked out one connection: > > fe8678e73990 tcp0 0 139.18.25.33.58935199.254.60.1.53 > TMWAIT > > > But 'fstat -n | grep 73990' shows no result. lsof also shows no socket for > this connect

Re: DoS attack against TCP services

2015-02-09 Thread Sverre Froyen
> On 2015-02-04, at 12:32, Christos Zoulas wrote: > > On Feb 4, 7:44pm, 6b...@6bone.informatik.uni-leipzig.de > (6b...@6bone.informatik.uni-leipzig.de) wrote: > -- Subject: Re: DoS attack against TCP services > > | Now the server has over 5000 TIME_WAIT connections. &

Re: DoS attack against TCP services

2015-02-07 Thread Greg Troxel
It might all be the same bug. I just meant that so far, at least the mailinglist and me privately do not have any evidence that you are actually being attacked. (And, it seems like Christos is fixing up the timer logic, which will help all around.) pgpbJzhACMA0A.pgp Description: PGP signature

Re: DoS attack against TCP services

2015-02-07 Thread Christos Zoulas
On Feb 5, 12:29am, 6b...@6bone.informatik.uni-leipzig.de (6b...@6bone.informatik.uni-leipzig.de) wrote: -- Subject: Re: DoS attack against TCP services | dmesg reports in loger intervals: | | nd6_storelladdr: something odd happens | | I do not know if this is the cause for the TIME_WAIT

Re: DoS attack against TCP services

2015-02-07 Thread 6bone
On Sat, 7 Feb 2015, Greg Troxel wrote: I don't know; I will take look, but in this case the connections are initiated by the inflicted system. And so far we don't have any traces showing packets that look like attacks. There must be no attack, yes. However, it is described that the attack e

Re: DoS attack against TCP services

2015-02-07 Thread Greg Troxel
chris...@zoulas.com (Christos Zoulas) writes: > On Feb 7, 12:53pm, 6b...@6bone.informatik.uni-leipzig.de > (6b...@6bone.informatik.uni-leipzig.de) wrote: > -- Subject: Re: DoS attack against TCP services > > | On Fri, 6 Feb 2015, Robert Elz wrote: > | > | > What'

Re: DoS attack against TCP services

2015-02-07 Thread Christos Zoulas
On Feb 7, 12:53pm, 6b...@6bone.informatik.uni-leipzig.de (6b...@6bone.informatik.uni-leipzig.de) wrote: -- Subject: Re: DoS attack against TCP services | On Fri, 6 Feb 2015, Robert Elz wrote: | | > What's more, it seems peculiar to your system, as no-one else seems to | > be report

Re: DoS attack against TCP services

2015-02-07 Thread 6bone
On Fri, 6 Feb 2015, Robert Elz wrote: What's more, it seems peculiar to your system, as no-one else seems to be reporting similar problems. So I'd be investigating how the timers are working (or are not working) in the kernel - perhaps even try selecting a different timer. Just to make sure

Re: DoS attack against TCP services

2015-02-05 Thread Christos Zoulas
On Feb 6, 12:49am, 6b...@6bone.informatik.uni-leipzig.de (6b...@6bone.informatik.uni-leipzig.de) wrote: -- Subject: Re: DoS attack against TCP services | On Fri, 6 Feb 2015, Robert Elz wrote: | | > I assume that time (as seen from user processes) is functioning correctly? | | ndp -a sh

Re: DoS attack against TCP services

2015-02-05 Thread 6bone
On Fri, 6 Feb 2015, Robert Elz wrote: I assume that time (as seen from user processes) is functioning correctly? ndp -a shows: ... 2001:638:902:2000:290:f5ff:fe39:3815 00:90:f5:39:38:15 vlan14 23h27m30s S 2001:638:902:2000:565:50de:c658:60cc 90:b1:1c:a6:b5:99 vlan14 expired R 2001:638:902:2

Re: DoS attack against TCP services

2015-02-05 Thread 6bone
On Fri, 6 Feb 2015, Robert Elz wrote: What's more, it seems peculiar to your system, as no-one else seems to be reporting similar problems. So I'd be investigating how the timers are working (or are not working) in the kernel - perhaps even try selecting a different timer. I wonder also that

Re: DoS attack against TCP services

2015-02-05 Thread Robert Elz
Date:Wed, 4 Feb 2015 23:27:39 +0100 (CET) From:6b...@6bone.informatik.uni-leipzig.de Message-ID: | I'm afraid I have chosen the wrong subject. After some testing, I found | that all tcp connections go in the TIME_WAIT state. It would be all TCP connections that

Re: DoS attack against TCP services

2015-02-05 Thread Christos Zoulas
In article , <6b...@6bone.informatik.uni-leipzig.de> wrote: >dmesg reports in loger intervals: > >nd6_storelladdr: something odd happens > >I do not know if this is the cause for the TIME_WAIT connections or a >consequence of TIME_WAIT connections. > Ok, I've been debugging memory initialization

Re: DoS attack against TCP services

2015-02-04 Thread 6bone
Husemann To: Christos Zoulas Cc: 6b...@6bone.informatik.uni-leipzig.de, current-users@netbsd.org Subject: Re: DoS attack against TCP services On Wed, Feb 04, 2015 at 05:33:10PM -0500, Christos Zoulas wrote: Something timer related? Are there any clock events? One of the cores dead/lievlocked in

Re: DoS attack against TCP services

2015-02-04 Thread Michael van Elst
6b...@6bone.informatik.uni-leipzig.de writes: >the process is the named (version: bind-9.10.1pl1). The outgoing >connections are normal. stopping the named do not remove the TIME_WAIT >connections. The TIME_WAIT entries aren't connected to a process anymore. That's normal behaviour. -- --

Re: DoS attack against TCP services

2015-02-04 Thread Martin Husemann
On Wed, Feb 04, 2015 at 05:33:10PM -0500, Christos Zoulas wrote: > Something timer related? Are there any clock events? One of the cores dead/lievlocked in softnet? Martin

Re: DoS attack against TCP services

2015-02-04 Thread Christos Zoulas
On Feb 4, 11:27pm, 6b...@6bone.informatik.uni-leipzig.de (6b...@6bone.informatik.uni-leipzig.de) wrote: -- Subject: Re: DoS attack against TCP services | Hello, | | I'm afraid I have chosen the wrong subject. After some testing, I found | that all tcp connections go in the TIME_WAIT

Re: DoS attack against TCP services

2015-02-04 Thread 6bone
Hello, I'm afraid I have chosen the wrong subject. After some testing, I found that all tcp connections go in the TIME_WAIT state. This applies to inbound connections and outbound connections. To me it looked like an attack. But now I think it is a kernel error. After restarting the server a

Re: DoS attack against TCP services

2015-02-04 Thread 6bone
: Re: DoS attack against TCP services Hello. The output from the sample netstat indicates that some process on the machine from which this output was taken is opening up a bunch of connections to remote sites on port 53. I think it would be interesting to know if all of these connections

Re: DoS attack against TCP services

2015-02-04 Thread Brian Buhrow
Hello. The output from the sample netstat indicates that some process on the machine from which this output was taken is opening up a bunch of connections to remote sites on port 53. I think it would be interesting to know if all of these connections are generated from the same process o

Re: DoS attack against TCP services

2015-02-04 Thread Brian Buhrow
hat's responsible for these connections failing to close the sockets once the connections terminate. -thanks -Brian On Feb 4, 7:44pm, 6b...@6bone.informatik.uni-leipzig.de wrote: } Subject: Re: DoS attack against TCP services } Now the server has over 5000 TIME_WAIT connections. } } netstat

Re: DoS attack against TCP services

2015-02-04 Thread 6bone
eb 2015 11:49:16 -0800 From: Brian Buhrow To: 6b...@6bone.informatik.uni-leipzig.de, Christos Zoulas Cc: current-users@NetBSD.org, buh...@nfbcal.org Subject: Re: DoS attack against TCP services hello. I'd suggest capturing the output of netstat -An. The first column of that outpu

Re: DoS attack against TCP services

2015-02-04 Thread Christos Zoulas
On Feb 4, 7:44pm, 6b...@6bone.informatik.uni-leipzig.de (6b...@6bone.informatik.uni-leipzig.de) wrote: -- Subject: Re: DoS attack against TCP services | Now the server has over 5000 TIME_WAIT connections. | | netstat -a -n | grep TIME_WAIT | tcp0 0 139.18.25.33.59256

Re: DoS attack against TCP services

2015-02-04 Thread 6bone
2015 19:54:59 +0100 From: Johnny Billquist To: 6b...@6bone.informatik.uni-leipzig.de, Christos Zoulas Cc: current-users@netbsd.org Subject: Re: DoS attack against TCP services Are you *sure* the same connections stay around forever, or might it just be that you get new ones at a higher rate

Re: DoS attack against TCP services

2015-02-04 Thread Johnny Billquist
nteressing for a problem report? Regards Uwe On Wed, 4 Feb 2015, Christos Zoulas wrote: Date: Wed, 4 Feb 2015 15:40:00 + (UTC) From: Christos Zoulas To: current-users@netbsd.org Subject: Re: DoS attack against TCP services In article , <6b...@6bone.informatik.uni-leipzig.de> wro

Re: DoS attack against TCP services

2015-02-04 Thread 6bone
Zoulas To: current-users@netbsd.org Subject: Re: DoS attack against TCP services In article , <6b...@6bone.informatik.uni-leipzig.de> wrote: Hello, The problem occurred again. The kernel has over 3,000 connections in TIME_WAIT state. The compounds are after an hour wait not disappeared. Th

Re: DoS attack against TCP services

2015-02-04 Thread Christos Zoulas
In article , <6b...@6bone.informatik.uni-leipzig.de> wrote: >Hello, > >The problem occurred again. The kernel has over 3,000 connections in >TIME_WAIT state. The compounds are after an hour wait not disappeared. >There are more and more connections in the TIME_WAIT state. My settings >are: > >n

Re: DoS attack against TCP services

2015-02-04 Thread 6bone
n Elst To: current-users@netbsd.org Newsgroups: lists.netbsd.current-users Subject: Re: DoS attack against TCP services b...@update.uu.se (Johnny Billquist) writes: Timeout should not depend on distance, and should actually be (at least) 2*MSS, which would be something in the several minutes range

Re: DoS attack against TCP services

2015-01-19 Thread Michael van Elst
b...@update.uu.se (Johnny Billquist) writes: >Timeout should not depend on distance, and should actually be (at least) >2*MSS, which would be something in the several minutes range. It's 2*msl but msl can be a bit variable net.inet.tcp.mslt.enable = 1 net.inet.tcp.mslt.loopback = 2 net.inet.tcp

Re: DoS attack against TCP services

2015-01-19 Thread Johnny Billquist
On 2015-01-19 10:24, Michael van Elst wrote: 6b...@6bone.informatik.uni-leipzig.de writes: Unfortunately, all TCP connections are now in the TIME_WAIT state. bash-4.3 # netstat -a -n | grep TIME_WAIT | wc -l 34611 Is there a way to remove it without rebooting the server? tcpdrop(8)?

Re: DoS attack against TCP services

2015-01-19 Thread 6bone
On Mon, 19 Jan 2015, Michael van Elst wrote: Date: Mon, 19 Jan 2015 09:24:02 + (UTC) From: Michael van Elst To: current-users@netbsd.org Newsgroups: lists.netbsd.current-users Subject: Re: DoS attack against TCP services 6b...@6bone.informatik.uni-leipzig.de writes: Unfortunately, all

Re: DoS attack against TCP services

2015-01-19 Thread Michael van Elst
6b...@6bone.informatik.uni-leipzig.de writes: >>> Unfortunately, all TCP connections are now in the TIME_WAIT state. >>> >>> bash-4.3 # netstat -a -n | grep TIME_WAIT | wc -l >>> 34611 >>> >>> Is there a way to remove it without rebooting the server? >> >> tcpdrop(8)? >It works. But why does

Re: DoS attack against TCP services

2015-01-19 Thread 6bone
On Sun, 18 Jan 2015, Mindaugas Rasiukevicius wrote: Date: Sun, 18 Jan 2015 23:22:47 + From: Mindaugas Rasiukevicius To: 6b...@6bone.informatik.uni-leipzig.de Cc: current-users@netbsd.org Subject: Re: DoS attack against TCP services 6b...@6bone.informatik.uni-leipzig.de wrote: Hello, it

Re: DoS attack against TCP services

2015-01-18 Thread Mindaugas Rasiukevicius
6b...@6bone.informatik.uni-leipzig.de wrote: > Hello, > > it was launched a DoS attack against my server. The attacker opened ssh > connections from different servers until all sockets are use. > > I have stopped the ssh service and terminates all processes. > Unfortunately, all TCP connections

DoS attack against TCP services

2015-01-18 Thread 6bone
Hello, it was launched a DoS attack against my server. The attacker opened ssh connections from different servers until all sockets are use. I have stopped the ssh service and terminates all processes. Unfortunately, all TCP connections are now in the TIME_WAIT state. bash-4.3 # netstat -a