similar to: Not Responding To TCP Connections

Displaying 20 results from an estimated 10000 matches similar to: "Not Responding To TCP Connections"

2004 Jun 22
2
Tcp listen limit.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi folks. Please, someone confirm if i'm right. if i'm wrong, please forgive-me. - -------------------------------------------------------------------------------------------------------------- I've developed a little tool to stress test tcp connections.( Sending syn and answer ack-syn ). that simuates a real tcp connection. (
2008 Sep 05
1
Weird TCP problem
Last week, I started seeing very strange behavior in one of the networks that I manage. The office LAN uses a Linux firewall which masquerades their workstations over their DSL connection. There are probably ~75 workstations in the office LAN. Their mail server is in a collocated facility nearby. That server has an RFC1918 address; its router does SNAT to forward packets to the system. Both
2008 Jul 10
1
TX tcp checksum errors with Xen GPLPV 0.9.9 Drivers (xen 3.2.1 and windows Server x86 2003 R2)
Hello, My first post on Xen-Users, so .. i''ve discovered a strange problem. Setup: -A Windows server 2003R2 (x86) with GPL PV driver 0.9.9 ipferf 1.7.0 (from 2003) -dom0 a opensuse 11.0 xen: # rpm -q -a |grep -i xen kqemu-kmp-xen-1.3.0pre11_2.6.25.5_1.1-7.1 kiwi-desc-xenboot-2.38-67.1 xen-3.2.1_16881_04-4.2 xen-tools-3.2.1_16881_04-4.2 xen-libs-3.2.1_16881_04-4.2
2003 May 19
5
FreeBSD firewall block syn flood attack
Hello, I current have a FreeBSD 4.8 bridge firewall that sits between 7 servers and the internet. The servers are being attacked with syn floods and go down multiple times a day. The 7 servers belong to a client, who runs redhat. I am trying to find a way to do some kind of syn flood protection inside the firewall. Any suggestions would be greatly appreciated. -- Ryan James ryan@mac2.net
2005 Nov 04
2
openssh vulnerability WITH TCP DUMP!
Hi Guys, My Debian box has been hacked a few days ago using an OpenSSH vulnerability. Subsequently my box was used for sending spam and as a hacking platform (according to my ISP). I was running a fairly recent version of OpenSSH (3.9p1). I reinstalled my box (now with 3.8p1 as supplied by Debian Stable), and started tcpdump to see if I would get lucky. I DID! The aut.log file shows the
2006 Oct 17
2
Re: Tc rules Help with multiISP+ squid& squidguard...
Tom wrote : >My advice to you is still the same -- you are going to have to use tcpdump >or ethereal to see what is happening. You have the computer there in front >of you >-- we don''t. So only you are going to be able to solve this. We are not. >From the dump you sent, it looks like many SYN packets are being sent on >ppp0 >and never replied to. So you need to
2004 Nov 08
3
nessusd on shorewall
Hi, I have shorewall version 1.4.10g on Redhat 9 Local clients are on eth1 in subnet 192.168.3.0/24. eth0 is for the outside (over xdsl with includes a ppp0 interface). Nessus (nessusd) is installed *on the firewall* and managed trough nessus (the client or frontend) running on one of the internal machines. When I was running a scan against 194.152.181.36 I observed several entries like
2018 Feb 26
2
RFC 8305 Happy Eyeballs in OpenSSH
Hi, On Mon, Feb 26, 2018 at 11:32:26AM +0000, Kim Minh Kaplan wrote: > TL;DR: please try the patch out and report if it causes "Did not receive > identification string" log messages. I believe it does not. It depends on absolute RTT to the target. If you stay local ("< 50ms"), the 250ms offset should reliably avoid DNIS logs. If you happen to connect to Australia
2019 Apr 16
0
No ack packet for tcp SYN with window scale of 64
I have found a very strange problem. We found that the time of establishing the websocket connection between mobile phone and server was too long. Then I use tcpdump to capture the data and found that the problem maybe has something to do with window scale option in SYN packet. Here is the SYN packet for websocket connection: 55488 ? 443 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=64
1997 Jan 12
9
dos-attack on inetd.
Hi. I don''t know if this one is known, but I can''t recall seeing anything about it. If it is old news I apologize. I discovered a bug in the inetd that comes with NetKit-B-0-08 and older. If a single SYN is sent to port 13 of the server, inetd will die of Broken Pipe: write(3, "Sun Jan 12 21:50:35 1997\r\n", 26) = -1 EPIPE (Broken pipe) --- SIGPIPE (Broken pipe) ---
2017 Jan 17
1
virtio: Subtle changes to virtio_net flags breaks VXLAN on Google Cloud
Commits: fd2a0437dc33 virtio_net: introduce virtio_net_hdr_{from,to}_skb e858fae2b0b8 virtio_net: use common code for virtio_net_hdr and skb GSO conversion introduced a subtle (but unexplained) difference in how virtio_net flags are derived from skb->ip_summed fields on transmit from the guest to the host/backend. Prior to the patches the flags would be set to VIRTIO_NET_HDR_F_NEEDS_CSUM if
2017 Jan 17
1
virtio: Subtle changes to virtio_net flags breaks VXLAN on Google Cloud
Commits: fd2a0437dc33 virtio_net: introduce virtio_net_hdr_{from,to}_skb e858fae2b0b8 virtio_net: use common code for virtio_net_hdr and skb GSO conversion introduced a subtle (but unexplained) difference in how virtio_net flags are derived from skb->ip_summed fields on transmit from the guest to the host/backend. Prior to the patches the flags would be set to VIRTIO_NET_HDR_F_NEEDS_CSUM if
1999 Mar 17
0
CIAC Bulletin J-035: Linux Blind TCP Spoofing
Enjoy.... ugh. Dan ____________________________________________________________________________ Dan Yocum | Phone: (630) 840-8525 Computing Division OSS/FSS | Fax: (630) 840-6345 .~. L Fermi National Accelerator Lab | email: yocum@fnal.gov /V\ I P.O. Box 500 | WWW: www-oss.fnal.gov/~yocum/ // \\ N Batavia, IL
2008 Mar 11
1
Cingular/ATT killing my IMAP/POP connections with bad TCP FIN packets?
Hello all, I've got an issue I'm almost positive is not related to Dovecot, but was wondering whether anyone else has had similar problems or could duplicate my results. Please accept my apologies if this is considered off-topic or this issue is actually just a symptom of my own ignorance. Also, sorry for how long this email got, I knew I wouldn't be able to explain my issue in
2003 Nov 21
2
question on scalability
Hello All, We have a Linux cluster application that uses openssh as its inter-node communication mechanism and we've recently run into a problem that points to a potential scalability issue in openssh code. Our client nodes systematically open ssh connections to the server node to execute an administrative command. When establishing socket connections, the server side sometimes fails to
2007 Jul 22
1
Fwd: PFIFO to contain more pkts than allowed by TCP peer?
Maybe this is the right place to ask? Thanks again, Daniel Begin forwarded message: > From: Daniel Schaffrath <daniel.schaffrath@mac.com> > Date: 21 July 2007 11:01:01 GMT+02:00 > To: linux-net@vger.kernel.org > Subject: PFIFO to contain more pkts than allowed by TCP peer? > > Hello everybody, > > when the one and only connection originating my box is a TCP stream
2005 Jul 02
3
packets with syn/fin vs pf_norm.c
Hi, First of all, I know that not dropping SYN/FIN isn't really a big deal, it just makes no sense. But since it doesn't make any sense, I don't see the reason why not to discard them. I'm running pf on FreeBSD 5.4-RELEASE-p3 and I scrub any traffic. I've read some other posts on google and as far as I can tell, clearly invalid packets (like packets with SYN/RST set) is
2005 Sep 22
13
Recommendation On Ping And Alert Tool
A bit off topic, but I keep looking for an answer to this question and coming up with nothing... so I thought I would go to the gurus. :-) Can anyone recommend a good package for pinging other devices and sending an email/alert when they go down? I'm aware of all kinds of more complex things with GUIs and a zillion other bells and whistles we aren't looking for, but we just want a simple
2016 Oct 28
3
Outlook 2010 woes
So after several days of more troubleshooting, I have some things to report to the list. First and foremost, I have discovered that the issue has nothing to do with SSL/TLS, which was my earlier suspicion because after doing some PCAPs I discovered that the transactions were negotiating TLS 1.2 on the new server, as opposed to 1.0 on the old. Also thank you for the rawlog suggestion: that
2018 Oct 21
1
Configure Ubuntu Server 16.04 for icecast2
Those speed tests are best case scenario - one big old file where the only overhead would be tcp syn/acks. 5000 x syn/acks and handshakes everytime a client connects would quite a lot of overhead I imagine. Note that this is an educated guess - I don't run /anything/ on the scale of 5000 users lol ---- Jordan Erickson wrote ---- >Hi Frederick, > >Wouldn't overhead (at least