Re: How to diagnose "Limiting closed port RST response from 213 to 205 packets/sec" ?
Date: Sun, 01 Sep 2024 08:32:25 UTC
On 2024-08-31 07:32, Pete French wrote: > So I am running some servers with 14.1-STABLE, pretty standard - Apache + > mysql > setup, and I am seeing a lot of the above messages. I have always seen these > form > time to time, but recently I have had compmnaits from a customer about the > webservers being unavailable, and the times they give correspond to bursts > of > these errors. > > I dont see any other errors, and am wondering how to get more info about > this > message. Knowing if its IPv4 or IPv6 would be nice. Knowing the port that is > closed would be ideal. I have a feeling that the closed port is the one > which > Apaxche is suppsoed to be listenin gon (I cant think of nay other ports > which > would get hammered), but that should never be closed. Check the www logs against the same times you're seeing these in messages. Bad bots "search engines" will often flood your server(s). It can also be the result of local scripts making massive queries outbound (a script running on a [local] customer web server?). Lastly, someone pounding on your box either directly, or by way of deflected queries (harder to track). Some ways to track; check all your other logs against the same times those messages show up in messages. Crank up verbosity in logs. Lastly; you might be able to better ferret some additional clues in sysctl.conf(5) by tweaking the net.inet.tcp.log_in_vain setting; from tcp(4): log_in_vain Log any connection attempts to ports where there is no socket accepting connections. The value of 1 limits the logging to SYN (connection establishment) packets only. A value of 2 results in any TCP packets to closed ports being logged. Any value not listed above disables the logging (default is 0, i.e., the logging is disabled). Warning, you'll see a good number of entries many (most) are innocent/harmless. You'll of course only be interested in those corresponding with the messages you're receiving. You'll probably only want to use this during the periods your concerned with. As this is a pretty noisy log. I see these messages all the time, and managed to track the offending IP using at least one of the above. I run pf(4). So add the offending IP to a block table, and am never forced to deal with them again. :) HTH --Chris > > Any advice ? > > -pete.