博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
possible SYN flooding on port 3690 Sending cookies
阅读量:6590 次
发布时间:2019-06-24

本文共 2095 字,大约阅读时间需要 6 分钟。

possible SYN flooding on port 3690. Sending cookies(转)

possible SYN flooding on port 3690. Sending cookies 开了syncookie之后经常会看到这个报警信息“possible SYN flooding on port 3690. Sending cookies”

首先我们看看sysctl.txt对syncookie选项的注释:
tcp_syncookies - BOOLEAN
Only valid when the kernel was compiled with CONFIG_SYNCOOKIES
Send out syncookies when the syn backlog queue of a socket
overflows. This is to prevent against the common ’syn flood attack’
Default: FALSE
Note, that syncookies is fallback facility.
It MUST NOT be used to help highly loaded servers to stand
against legal connection rate. If you see synflood warnings
in your logs, but investigation shows that they occur
because of overload with legal connections, you should tune
another parameters until this warning disappear.
See: tcp_max_syn_backlog, tcp_synack_retries, tcp_abort_on_overflow.
如果系统资源还没问题的话,应该多数不是受到syn flood,而是并发连接过多。
上面的说明建议我们修改tcp_max_syn_backlog, tcp_synack_retries, tcp_abort_on_overflow.
net.ipv4.tcp_max_syn_backlog = 20480
net.ipv4.tcp_synack_retries = 1
net.ipv4.tcp_syn_retries = 1
net.core.netdev_max_backlog = 1000
net.core.netdev_max_backlog = 300000 # number of unprocessed input packets before kernel starts dropping them, default 300
tcp_max_syn_backlog - INTEGER
Maximal number of remembered connection requests, which are
still did not receive an acknowledgment from connecting client.
Default value is 1024 for systems with more than 128Mb of memory,
and 128 for low memory machines. If server suffers of overload,
try to increase this number.
tcp_abort_on_overflow - BOOLEAN
If listening service is too slow to accept new connections,
reset them. Default state is FALSE. It means that if overflow
occurred due to a burst, connection will recover. Enable this
option _only_ if you are really sure that listening daemon
cannot be tuned to accept connections faster. Enabling this
option can harm clients of your server. 这个我们还是别设置了。
最后,设置了net.ipv4.tcp_max_syn_backlog = 819200之后,没有报那个syncookie警告了。

/proc/sys/net/ipv4/tcp_max_syn_backlog

本文转自 南非波波 51CTO博客,原文链接:http://blog.51cto.com/nanfeibobo/1719323,如需转载请自行联系原作者
你可能感兴趣的文章
Juval Löwy:为什么每个类都应该是一个服务
查看>>
用JEP 343打包工具,构建自包含、可安装的Java应用程序
查看>>
TOP 13大最热开源微服务Java框架
查看>>
微服务落地,我们在考虑什么?\n
查看>>
Adaptive Execution让Spark SQL更高效更好用
查看>>
艰困之道中学到的经验教训
查看>>
区块链和数据科学:如果同时应用这两种技术,将会实现什么?
查看>>
BAT集体升级云事业部,这背后都藏着哪些“小心思”?
查看>>
.NET Core 2.1的重大缺陷延长了.NET Core 2.0的寿命
查看>>
谈谈UCloud的秒级在线快照服务
查看>>
俄罗斯世界杯直播背后的技术趋势
查看>>
Visual Studio 2017 15.9预览版3支持ARM64 for UWP
查看>>
配置PHPStorm+Vagrant+Laravel的Xdebug调试环境
查看>>
DevOps日常:别人家的运维这样过
查看>>
微软推出VS Code新特性,为TypeScript和JavaScript用户提供AI辅助开发功能
查看>>
要突破技术瓶颈?80%的人忽略了这个因素
查看>>
通过减少内存使用改善.NET性能
查看>>
道术结合,方可修炼成架构师
查看>>
Apache Pulsar中的地域复制,第2篇:模式和实践
查看>>
JetBrains在CLion的Linux和OS X版本中引入Swift支持
查看>>