similar to: [LLVMdev] Re: Syn

Displaying 20 results from an estimated 9000 matches similar to: "[LLVMdev] Re: Syn"

2004 Oct 21
2
[LLVMdev] Syn
Hi, I just wrote up a recent project which I think would be a natural fit with LLVM. I'm curious if y'all see this working well or if you can see any gotchas. Also potentially interested in finding someone comfortable with LLVM who would like to collaborate: Executive summary: What if the syntax and semantics of a programming language were specified in a library, rather than built
2004 Oct 22
0
[LLVMdev] Syn
This sounds ambitious and should be very interesting, if you can make it work. The closest example I have heard of is work on metaprogramming (or partial evaluation) by exposing a compiler's parse trees to the programmer, but I suspect that is more limited. I don't know specific references offhand but one of the papers on MetaOCaml (which takes a different approach) may have
2007 Mar 23
1
Expected handling of [SYN] when expecting [SYN, ACK]?
Hi, I''ve been developing a peer-to-peer application, and have recently been trying to add STUNT (http://www.cis.nctu.edu.tw/~gis87577/xDreaming/XSTUNT/Docs/XSTUNT%20Ref erence.htm) to allow firewall/NAT traversal. I got a box with Shorewall to use for testing, and am now trying to work out whether Shorewall is actually designed to prevent such connections? I notice in the FAQs that
2007 Mar 26
0
Re: Expected handling of [SYN] when expecting[SYN, ACK]?
Hi Tom, Many thanks for that, that''s really helped. Netfilter is indeed dropping the packets as invalid. Thanks and regards, Frances -----Original Message----- From: Tom Eastep [mailto:teastep@shorewall.net] Sent: 23 March 2007 18:05 To: Shorewall Users Subject: Re: [Shorewall-users] Expected handling of [SYN] when expecting[SYN, ACK]? Frances Flood wrote: > Basically, if the
2014 Jan 24
1
Possible SYN flooding on port 8000. Sending cookies
Hi *Problem *- I'm running Icecast in a VM container on OpenVZ. Syslog on the hardware node (HN) shows these error messages: Jan 23 18:43:05 HN kernel: [27469893.430615] possible SYN flooding on port 8000. Sending cookies. Jan 23 21:37:40 HN kernel: [27480362.817944] possible SYN flooding on port 8000. Sending cookies. Jan 23 23:43:50 HN kernel: [27487929.582025] possible SYN flooding on
2003 Nov 28
0
For those of you that uses syn Text Editor to edit .R files
Hi, sorry to bother you, and that this is probably not the right list :-), but I read that some of you might use syn as Editor for .R files. I've released an unofficial Version of the syn Text Editor with improved support for R (I'm the initial developer of this program, btw.). syn is a Windows 32 Program (Win9x, NT4, 2000), but maybe it runs also inside Wine, I didn't try it.
2005 Mar 23
1
syn flood protection - inside initiated attacks
Perhaps someone will help me on this :- I have read a lot of examples of syn flood protect on the INPUT chain. That I have no question at all. I wonder if it make sense to perform syn flood protection at the FORWARD chain ? If packets are originated from a LAN worm, and are not targetted at the firewall itself, but rather at hosts in the internet, will it cause problem with the firewall itself,
2019 Apr 16
0
No ack packet for tcp SYN with window scale of 64
I have found a very strange problem. We found that the time of establishing the websocket connection between mobile phone and server was too long. Then I use tcpdump to capture the data and found that the problem maybe has something to do with window scale option in SYN packet. Here is the SYN packet for websocket connection: 55488 ? 443 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=64
1997 Feb 28
0
forwarded from BoS: Linux anti-SYN flooding patch
I have just finished a patch to linux 2.0.29 that provides the SYN cookies protection against SYN flood attacks. You can grab it from my home page at: http://www.dna.lth.se/~erics/software/tcp-syncookies-patch-1.gz You can also follow the pointers from my home page (see the signature) to get a very short blurb about this patch. Quick synopsys: This implements the SYN cookie defense against SYN
2018 Jul 20
0
database node / possible SYN flooding on port 3306
On 07/20/2018 03:56 AM, Leon Fauster via CentOS wrote: > Hi folks, > > I have here a database node running > > # rpm -qa | grep mysql-server > mysql55-mysql-server-5.5.52-1.el6.x86_64 > > on > > # virt-what > vmware > > > that seems to have a connection problem: > > # dmesg |grep SYN |tail -5 > possible SYN flooding on port 3306. Sending cookies.
2011 May 25
1
kernel: possible SYN flooding on port 655. Sending cookies.
On a Linux Server running tincd I noticed the following log message in /var/log/messages kernel: possible SYN flooding on port 655. Sending cookies. I found this on the web: If SYN cookies are enabled, then the kernel doesn't track half open connections at all. Instead it knows from the sequence number in the following ACK datagram that the ACK very probably follows a SYN and a SYN-ACK.
2018 Jul 20
2
database node / possible SYN flooding on port 3306
Hi folks, I have here a database node running # rpm -qa | grep mysql-server mysql55-mysql-server-5.5.52-1.el6.x86_64 on # virt-what vmware that seems to have a connection problem: # dmesg |grep SYN |tail -5 possible SYN flooding on port 3306. Sending cookies. possible SYN flooding on port 3306. Sending cookies. possible SYN flooding on port 3306. Sending cookies. possible SYN flooding on
2001 Apr 22
0
Prioritzing SYNs and SYN-ACKs with Diffserv
Hi, I''m interested in prioritizing all packets with the SYN bit on, both with and without the ACK bit on (but specially the SYN ACKS). I am checking is the use of Diffserv. From a paper I read I understood that when Diffserv is on, all "Control Traffic", including TCP SYN-ACKs, gets by default into "band 0" of Diffserv, the highest priority out of 16 bands. If true,
2018 Jul 21
1
database node / possible SYN flooding on port 3306
> Am 20.07.2018 um 18:52 schrieb Nataraj <incoming-centos at rjl.com>: > > On 07/20/2018 03:56 AM, Leon Fauster via CentOS wrote: >> Hi folks, >> >> I have here a database node running >> >> # rpm -qa | grep mysql-server >> mysql55-mysql-server-5.5.52-1.el6.x86_64 >> >> on >> >> # virt-what >> vmware >>
2014 Apr 16
1
Possible SYN flooding
Anyone seen this problem? server Apr 16 14:34:28 nas1 kernel: [7506182.154332] TCP: TCP: Possible SYN flooding on port 49156. Sending cookies. Check SNMP counters. Apr 16 14:34:31 nas1 kernel: [7506185.142589] TCP: TCP: Possible SYN flooding on port 49157. Sending cookies. Check SNMP counters. Apr 16 14:34:53 nas1 kernel: [7506207.126193] TCP: TCP: Possible SYN flooding on port 49159. Sending
2020 Mar 17
0
new bquote feature splice does not address a common LISP @ use case?
Hi Jan, In the lisp code you provide the operators are parsed as simple symbols in a pairlist. In the R snippet, they are parsed as left-associative binary operators of equal precedence. If you unquote a call in the right-hand side, you're artificially bypassing the left-associativity of these operators. To achieve what you're looking for in a general way, you'll need a more precise
2002 Apr 18
0
Syn Flood Protection
Hallo Group, i want to implement a syn Flood Protection on our linux Router. on our Cisco we have this Access-list and rat-limit rate-limit input access-group 190 128000 128000 128000 conform-action transmit exceed-action drop access-list 190 deny tcp any any established access-list 190 permit tcp any any access-list 190 deny ip any any now i was trying to wrote the same config with
1996 Sep 19
0
CERT Advisory CA-96.21 - TCP SYN Flooding and IP Spoofing Attacks
-----BEGIN PGP SIGNED MESSAGE----- ============================================================================= CERT(sm) Advisory CA-96.21 Original issue date: September 19, 1996 Last revised: -- Topic: TCP SYN Flooding and IP Spoofing Attacks - ----------------------------------------------------------------------------- *** This advisory supersedes CA-95:01. *** Two
2015 May 22
1
help please , How SYN and ACK packets counted by the server(centos)
I have a question about tcp layer of linux kernel. I want, Syn and ack packages received to server will be counted. [image: enter image description here] where total_syn_count and total_ack_count are variables to be defined and will be increased Which files to be used ???? tcp_input.c ,tcp_output.c , tcp_ipv4.c
2005 Jul 02
3
packets with syn/fin vs pf_norm.c
Hi, First of all, I know that not dropping SYN/FIN isn't really a big deal, it just makes no sense. But since it doesn't make any sense, I don't see the reason why not to discard them. I'm running pf on FreeBSD 5.4-RELEASE-p3 and I scrub any traffic. I've read some other posts on google and as far as I can tell, clearly invalid packets (like packets with SYN/RST set) is