- From: John D. Pritchard <jdp@cs.columbia.edu>
- Date: Sat, 28 Dec 1996 14:45:24 -0500
- To: Erez Levin <erezl@dingo.co.il>
- Cc: http-wg%cuckoo.hpl.hp.com@hplb.hpl.hp.com
> > It seems that two Hackers magazines have published the source code and > now any webserver in the world is opened to such and attack." > > (Summarised from "Globes" http://www.globes.co.il Israel financial > magazine, Hi-Tech section, tuesday edition). > > Is any of you guys familiar with this "SYN-flood" bombimg method? does > anyone know how you can located this suspects and place them under a > "black list" of forbidden sites? goto cert the attack fills up the response queue. if your response queue is larger than the flood, eg, Solaris, then there's no real vulnerability
Received on Friday, 3 January 1997 15:04:06 UTC