Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 24 Jan 2001 19:30:00 -0000
From:      "Jorge Filipe Andrade" <jfa@mail.sonet.pt>
To:        <blackman@blackman.ru>, <freebsd-security@freebsd.org>
Subject:   Re: socket: No buffer space available
Message-ID:  <030c01c0863c$0ae82680$1a0b08c3@sonet.pt>
References:  <01012417332701.31962@localhost.localdomain>

next in thread | previous in thread | raw e-mail | index | archive | help
Hello.

I have too this problem, but is in Squid Proxy Server...
In cache.log and in Microsoft Internet Explorer 5:

2001/01/24 19:04:24| comm_open: socket failure: (55) No buffer space
available
2001/01/24 19:04:24| comm_open: socket failure: (55) No buffer space
available

... and the squid proxy server not working correctly.
I running the squid proxy server in Dual PIII 500 Mhz with 384 RAM, FreeBSD
4.1.1-RELEASE and two network board, I have too installed a Cidera Inc.
Cache (SkyCache).

Any questions?

--
Best Regards,

Jorge Filipe Andrade
SONET - Serviços Internet, Lda
http://www.sonet.pt


----- Original Message -----
From: "Mr. Blackman" <blackman@blackman.ru>
To: <freebsd-security@freebsd.org>
Sent: Wednesday, January 24, 2001 2:32 PM
Subject: DoS: socket: No buffer space available


>
> Hello!
>
> Last days our server was DoSed (I'm sure).
> Ok, facts:
> The Problem:
> IP socket: No buffer space available
> UNIX Socket : No buffer space available
>
> Victim: FreeBSD 3.4
> Kernel compiled with these options:
> options ICMP_BANDLIM
> options TCP_DROP_SYNFIN
> options TCP_RESTRICT_RST
> options IPFIREWALL
> options IPFIREWALL_VERBOSE
> options IPFIREWALL_VERBOSE_LIMIT=10
>
> /etc/rc.conf:
> tcp_drop_synfin="YES"
> tcp_restrict_rst="YES"
> icmp_drop_redirect="YES"
> icmp_log_redirect="YES"
> firewall_enable="YES"
> firewall_script="/etc/rc.firewall"
> firewall_type="/etc/rc.firewall"
> firewall_quiet="NO"
>
> ### TCP STACK TUNING ###
> # TCP send/receive spaces
> sysctl -w net.inet.tcp.sendspace=32768
> sysctl -w net.inet.tcp.recvspace=32768
> # Socket queue defense against SYN attacks
> sysctl -w kern.ipc.somaxconn=1024   #!!!
> sysctl -w net.inet.icmp.drop_redirect=1
> sysctl -w net.inet.icmp.log_redirect=1
> sysctl -w net.inet.ip.redirect=0
> sysctl -w net.inet6.ip6.redirect=0
> sysctl -w net.link.ether.inet.max_age=1200
> sysctl -w net.inet.ip.sourceroute=0
> sysctl -w net.inet.ip.accept_sourceroute=0
> sysctl -w net.inet.icmp.bmcastecho=0
> sysctl -w net.inet.icmp.maskrepl=0
> ### END TCP STACK TUNING ###
>
> On this server all packets are filtered with IPFW and _all_, except 53 udp
are
> in "deny".
>
> Yes, I know about "named DoS", but the server is completely down.
> And only reboot solve the problem.
>
> Where is the problem, where is salvation?:)
>
> Thank you for attention.
>
> Mr. Blackman, Security Officer.
>
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-security" in the body of the message
>



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?030c01c0863c$0ae82680$1a0b08c3>