Hi!
I don't if this is already known but I thought it might be worth a notice. In package iplogger there is a daemon, tcplogd, which logs incoming tcp-connection attempts to syslog. It seems that this daemon forks a child for every connection discovered and if for example the machine running tcplogd is syn-flooded there will be a lot of tcplogd's forked. The tcplogd processes will die of by time but during the attack the machine will be more or less inaccessable. Info: iplogger 1.1-4 no syn-cookies support in kernel (2.2.12) Please Cc any answer to me since I have not subscribed to this list. /Ralf Nyrén

