Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 31 Mar 2001 00:50:11 -0500
From:      Nader Turki <nturki@adelphia.net>
To:        freebsd-questions@FreeBSD.ORG, freebsd-stable@FreeBSD.ORG
Subject:   Limiting closed port RST response
Message-ID:  <3AC57013.7801BB31@adelphia.net>

next in thread | raw e-mail | index | archive | help
hi there,
i'm running FreeBSD 4.2-STABLE. in the last 2 days the machine been
acting weird. and it takes the whole network down for some reason.
all i could find ion logs is.

Mar 30 18:43:03 shell /kernel: Limiting closed port RST response from
1883 to 200 packets per second
Mar 30 18:43:03 shell /kernel: Limiting closed port RST response from
2014 to 200 packets per second
Mar 30 18:43:03 shell /kernel: Limiting closed port RST response from
1681 to 200 packets per second
Mar 30 18:43:03 shell /kernel: Limiting closed port RST response from
1993 to 200 packets per second
Mar 30 18:43:09 shell /kernel: Limiting closed port RST response from
1961 to 200 packets per second
Mar 30 18:43:09 shell /kernel: Limiting closed port RST response from
1877 to 200 packets per second
Mar 30 18:43:09 shell /kernel: Limiting closed port RST response from
1790 to 200 packets per second
Mar 30 18:43:09 shell /kernel: Limiting closed port RST response from
1797 to 200 packets per second
Mar 30 18:43:09 shell /kernel: Limiting closed port RST response from
1993 to 200 packets per second
Mar 30 18:43:09 shell /kernel: Limiting closed port RST response from
1970 to 200 packets per second
Mar 30 18:43:39 shell /kernel: Limiting closed port RST response from
1930 to 200 packets per second
Mar 30 18:43:39 shell /kernel: Limiting closed port RST response from
2018 to 200 packets per second
Mar 30 18:43:39 shell /kernel: Limiting closed port RST response from
1899 to 200 packets per second
Mar 30 18:43:39 shell /kernel: Limiting closed port RST response from
1965 to 200 packets per second
Mar 30 18:43:39 shell /kernel: Limiting closed port RST response from
1937 to 200 packets per second
Mar 30 18:43:39 shell /kernel: Limiting closed port RST response from
1853 to 200 packets per second
Mar 30 18:43:39 shell /kernel: Limiting closed port RST response from
1946 to 200 packets per second
Mar 30 18:43:39 shell /kernel: Limiting closed port RST response from
448 to 200 packets per second
Mar 30 20:56:03 shell /kernel: xl0: promiscuous mode enabled
Mar 30 20:56:42 shell /kernel: xl0: promiscuous mode disabled
Mar 30 20:56:42 shell /kernel: xl0: promiscuous mode enabled
Mar 30 20:57:03 shell /kernel: xl0: promiscuous mode disabled
Mar 30 20:58:42 shell /kernel: xl0: promiscuous mode enabled
Mar 30 20:58:42 shell /kernel: xl0: promiscuous mode disabled

i'll show you a part of the isp's email :(

This is the 2nd time this week and you have now been charge the over
bandwith usage for the attack. The total comes to $3592 for 653 gig of
data
transfer.

the isp is telling me that it's going out of the machine. nobody got
root but me and even after i killed all the procs. it kept doing the
same thing.

hope someone can help me soon.

thanks,

nader


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-stable" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3AC57013.7801BB31>