From owner-freebsd-questions@FreeBSD.ORG Thu Sep 1 15:10:46 2005 Return-Path: X-Original-To: freebsd-questions@freebsd.org Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 8413316A41F for ; Thu, 1 Sep 2005 15:10:46 +0000 (GMT) (envelope-from cswiger@mac.com) Received: from pi.codefab.com (pi.codefab.com [199.103.21.227]) by mx1.FreeBSD.org (Postfix) with ESMTP id 2C2D943D45 for ; Thu, 1 Sep 2005 15:10:46 +0000 (GMT) (envelope-from cswiger@mac.com) Received: from localhost (localhost [127.0.0.1]) by pi.codefab.com (Postfix) with ESMTP id A10195DF7; Thu, 1 Sep 2005 11:10:45 -0400 (EDT) Received: from pi.codefab.com ([127.0.0.1]) by localhost (pi.codefab.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 41822-06; Thu, 1 Sep 2005 11:10:44 -0400 (EDT) Received: from [192.168.1.3] (pool-68-161-79-217.ny325.east.verizon.net [68.161.79.217]) by pi.codefab.com (Postfix) with ESMTP id 4D4075CA7; Thu, 1 Sep 2005 11:10:44 -0400 (EDT) Message-ID: <431719F5.3050201@mac.com> Date: Thu, 01 Sep 2005 11:10:45 -0400 From: Chuck Swiger Organization: The Courts of Chaos User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.11) Gecko/20050801 X-Accept-Language: en-us, en MIME-Version: 1.0 To: Dark Star References: In-Reply-To: Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit X-Virus-Scanned: amavisd-new at codefab.com Cc: freebsd-questions@freebsd.org Subject: Re: Limiting closed port X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 01 Sep 2005 15:10:46 -0000 Dark Star wrote: > /kernel: Limiting closed port RST response from 243 to 200 packets per > second > /kernel: Limiting closed port RST response from 222 to 200 packets per > second > /kernel: Limiting closed port RST response from 238 to 200 packets per > second > > I think its sometype of scan or attack. It's almost certainly a portscan. Per se, that's not an attack, but if someone follows up trying to exploit open services, it would be. > My server has a range of ips, I'm not sure what is this? how to > protect it? IPFW will prevent this? Yes, IPFW, PF, or another firewall can prevent this traffic. > how do i know, this attack to what IP excatly? Run "tcpdump -n". -- -Chuck