I am running a server that is running a service on port 59380. There are more than 1000 machines out there connecting to that service. Once I need to restart the service all those machines are connecting at the same time.
That made some trouble as I have seen that log entry in kern.log
TCP: Possible SYN flooding on port 59380. *Sending cookies*. Check SNMP counters.
So I changed sysctl net.ipv4.tcp_syncookies to 0 because the endpoints to not handle tcp syn cookies correctly. Finally I restarted my network to get the changes in production
Next time I had to restart the service, the following message was logged
TCP: Possible SYN flooding on port 59380. *Dropping request*. Check SNMP counters.
How can I prevent the system for doing such actions? All necessary counter measures are done by iptables...
listenman page, it says: "When syncookies are enabled there is no logical maximum length and this setting [tcp_max_syn_backlog] is ignored. See tcp(7) for more information." – Halfgaar Nov 29 '21 at 17:09