We need a resolution for a DDoS SYN_RECV flood attack our customer is having on a webserver. Details follow: Linux version: [login to view URL] #1 SMP Wed Sep 7 13:28:55 EDT 2005 i686 i686 i386 netstat details: tcp 0 0 [login to view URL] [login to view URL] SYN_RECV tcp 0 0 [login to view URL] [login to view URL] SYN_RECV tcp 0 0 [login to view URL] [login to view URL] SYN_RECV tcp 0 0 [login to view URL] [login to view URL] SYN_RECV tcp 0 0 [login to view URL] [login to view URL] SYN_RECV Please let me know what you'd charge to provide me the information to block this, or to patch the kernel, or whatever will be needed. Give me a good idea of what you are going to do -- I will hire someone who can handle this and will not steal their idea and perform the work myself. I cannot hire anyone who says "I can do this" without an explanation of a potential fix, as I must provide an explanation to my client before they will pay.
## Deliverables
1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done.
2) Deliverables must be in ready-to-run condition, as follows (depending on the nature of the deliverables):
a) For web sites or other server-side deliverables intended to only ever exist in one place in the Buyer's environment--Deliverables must be installed by the Seller in ready-to-run condition in the Buyer's environment.
b) For all others including desktop software or software the buyer intends to distribute: A software installation package that will install the software in ready-to-run condition on the platform(s) specified in this bid request.
3) All deliverables will be considered "work made for hire" under U.S. Copyright law. Buyer will receive exclusive and complete copyrights to all work purchased. (No GPL, GNU, 3rd party components, etc. unless all copyright ramifications are explained AND AGREED TO by the buyer on the site per the coder's Seller Legal Agreement).
## Platform
Linux