Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 9 Jun 1999 14:34:46 -0700 (PDT)
From:      Doug White <dwhite@resnet.uoregon.edu>
To:        Peter Kok <peter@sweda.com.hk>
Cc:        freebsd <freebsd-questions@FreeBSD.ORG>
Subject:   Re: dmesg
Message-ID:  <Pine.BSF.4.03.9906091424450.3005-100000@resnet.uoregon.edu>
In-Reply-To: <375B9067.4F4C5DFF@sweda.com.hk>

next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 7 Jun 1999, Peter Kok wrote:

> i would like to know the meaning of the following message
> 
> system:> dmesg
>  flood from 202.40.222.141 on 202.40.219.228:9080.  Sending cookies.
> Warning: possible SYN flood from 202.40.222.141 on 202.40.219.228:9080.
> Sending cookies
> Warning: possible SYN flood from 202.40.222.136 on 202.40.219.228:9080.
> Sending cookies
> fcntl_setlk() called by process 10092 (addits) with broken flock()
> emulation
> send_head NULL in tcp_retransmit_time

Someone's attempting to DoS your computer.  The machine recognizes this
and is attemting to protect itself by issuing cookies to the responses to
track their origin.

I don't know what that fcntl_setlk() function call is about though.

You should contact the owner of 202.40.222.141 or 202.40.222.136 and
inform them their system is disrupting network traffic.

Doug White                               
Internet:  dwhite@resnet.uoregon.edu    | FreeBSD: The Power to Serve
http://gladstone.uoregon.edu/~dwhite    | www.freebsd.org



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.03.9906091424450.3005-100000>