手头有台服务器最近一直被攻击,被攻击的时候服务器会直接断网,最奇怪的是局域网内都无法访问,只能拔掉网线再插上才能恢复。 想请教一下这是什么情况,外网无法访问我可以理解,是什么原因造成了局域网也无法访问?
[Fri Apr 14 10:29:11 2023] TCP: request_sock_TCP: Possible SYN flooding on port 2415. Dropping request. Check SNMP counters.
[Fri Apr 14 10:29:13 2023] TCP: request_sock_TCP: Possible SYN flooding on port 2416. Dropping request. Check SNMP counters.
[Fri Apr 14 10:29:16 2023] TCP: request_sock_TCP: Possible SYN flooding on port 2417. Dropping request. Check SNMP counters.
[Fri Apr 14 10:29:18 2023] TCP: request_sock_TCP: Possible SYN flooding on port 2418. Dropping request. Check SNMP counters.
[Fri Apr 14 10:29:21 2023] TCP: request_sock_TCP: Possible SYN flooding on port 2419. Dropping request. Check SNMP counters.
[Fri Apr 14 10:29:23 2023] TCP: request_sock_TCP: Possible SYN flooding on port 2420. Dropping request. Check SNMP counters.
[Fri Apr 14 10:29:26 2023] TCP: request_sock_TCP: Possible SYN flooding on port 2421. Dropping request. Check SNMP counters.
[Fri Apr 14 10:29:28 2023] TCP: request_sock_TCP: Possible SYN flooding on port 2422.
Ip:
Forwarding: 1
7714599460 total packets received
0 forwarded
0 incoming packets discarded
7714349931 incoming packets delivered
8749439270 requests sent out
47366 outgoing packets dropped
6063 dropped because of missing route
4922 reassemblies required
1017 packets reassembled ok
Icmp:
532003 ICMP messages received
11114 input ICMP message failed
ICMP input histogram:
destination unreachable: 515032
timeout in transit: 16821
echo requests: 138
echo replies: 12
265248 ICMP messages sent
0 ICMP messages failed
ICMP output histogram:
destination unreachable: 265068
echo requests: 42
echo replies: 138
IcmpMsg:
InType0: 12
InType3: 515032
InType8: 138
InType11: 16821
OutType0: 138
OutType3: 265068
OutType8: 42
Tcp:
1686409 active connection openings
1958453 passive connection openings
74282 failed connection attempts
210363 connection resets received
321 connections established
318181058 segments received
358256736 segments sent out
2329101 segments retransmitted
108 bad segments received
423496 resets sent
Udp:
7390711649 packets received
1011670 packets to unknown port received
4116888 packet receive errors
8447404689 packets sent
4102479 receive buffer errors
0 send buffer errors
InCsumErrors: 14407
IgnoredMulti: 204368
UdpLite:
TcpExt:
6 invalid SYN cookies received
1442 resets received for embryonic SYN_RECV sockets
802 ICMP packets dropped because they were out-of-window
1484500 TCP sockets finished time wait in fast timer
6773 time wait sockets recycled by time stamp
1379 packetes rejected in established connections because of timestamp
5473870 delayed acks sent
1978 delayed acks further delayed because of locked socket
Quick ack mode was activated 312653 times
592 SYNs to LISTEN sockets dropped
175469000 packet headers predicted
25983181 acknowledgments not containing data payload received
120956447 predicted acknowledgments
49 times recovered from packet loss due to fast retransmit
TCPSackRecovery: 70000
TCPSACKReneging: 3
Detected reordering 130693 times using SACK
Detected reordering 118 times using reno fast retransmit
Detected reordering 140 times using time stamp
409 congestion windows fully recovered without slow start
88 congestion windows partially recovered using Hoe heuristic
TCPDSACKUndo: 3108
1052 congestion windows recovered without slow start after partial ack
TCPLostRetransmit: 987758
13 timeouts after reno fast retransmit
TCPSackFailures: 426
2228 timeouts in loss state
1143021 fast retransmits
27493 retransmits in slow start
TCPTimeouts: 1103548
TCPLossProbes: 81461
TCPLossProbeRecovery: 3149
TCPRenoRecoveryFail: 19
TCPSackRecoveryFail: 4040
TCPBacklogCoalesce: 479989
TCPDSACKOldSent: 312029
TCPDSACKOfoSent: 433
TCPDSACKRecv: 299965
TCPDSACKOfoRecv: 40446
283950 connections reset due to unexpected data
12739 connections reset due to early user close
8746 connections aborted due to timeout
1 times unable to send RST due to no memory
TCPSACKDiscard: 140077
TCPDSACKIgnoredOld: 1113
TCPDSACKIgnoredNoUndo: 43299
TCPSpuriousRTOs: 203
TCPSackShifted: 2101142
TCPSackMerged: 1698981
TCPSackShiftFallback: 962368
TCPReqQFullDrop: 592
TCPRcvCoalesce: 12741549
TCPOFOQueue: 2138714
TCPOFOMerge: 401
TCPChallengeACK: 1166
TCPSYNChallenge: 115
TCPFastOpenCookieReqd: 99534
TCPSpuriousRtxHostQueues: 14684
TCPAutoCorking: 522777
TCPFromZeroWindowAdv: 5170
TCPToZeroWindowAdv: 5171
TCPWantZeroWindowAdv: 83550
TCPSynRetrans: 973914
TCPOrigDataSent: 250418873
TCPACKSkippedSynRecv: 60
TCPACKSkippedPAWS: 900
TCPACKSkippedSeq: 11425
TCPACKSkippedTimeWait: 220
TCPACKSkippedChallenge: 1044
TCPWinProbe: 1341
TCPKeepAlive: 3440624
TCPDelivered: 251602231
TCPAckCompressed: 1026994
TcpTimeoutRehash: 1075931
TcpDuplicateDataRehash: 52105
TCPDSACKRecvSegs: 69626
TCPDSACKIgnoredDubious: 276551
IpExt:
InMcastPkts: 2459135
OutMcastPkts: 841350
InBcastPkts: 521993
OutBcastPkts: 350186
InOctets: 816678687796
OutOctets: 2671968340361
InMcastOctets: 713887838
OutMcastOctets: 161067690
InBcastOctets: 49305467
OutBcastOctets: 33314198
InNoECTPkts: 7752006802
InECT1Pkts: 162368
InECT0Pkts: 4595
InCEPkts: 1518
1
artnowben 2023-04-15 23:17:29 +08:00
|
2
kwh 2023-04-15 23:18:07 +08:00
顺便问问有没有大佬知道,存不存在 浏览器发出的 http 请求服务端和客户端同时断开。
|
3
YaakovZiv 2023-04-15 23:21:10 +08:00
估计和我笔记本电脑类似情况,电脑接交换机,服务器大量流量转发我电脑,我电脑网络跑满,接收大量数据包,突然 CPU 和内存占用异常,电脑死机,只能拔掉网线访问。
虽然是我这个电脑使用者不在乎的网络数据,但电脑居然都处理,并且消耗很多硬件资源,直接出现了系统卡死。 |
4
ProjectSky OP @YaakovZiv 我的情况是本地登陆后系统占用并无异常,就是所有的内部 /外部网络连接都挂了。
当然不排除被攻击的时候资源占用异常,因为每次都是被攻击后才登陆服务器。 |