From: Roland T. (SourceForge) <raz...@co...> - 2004-06-15 07:31:17
|
Will wrote: > the attack originates from, with -sH stick generates random ip's. At > least on my box when I hit 32000 directories snort_inline dies, all > traffic being passed to queue space isn't ever inspected, and never > traverses the bridge i.e DoS. what do you guy's think about taring and > gziping everything within /var/log/snort when we hit x number of Do you actually want your log data chopped up into hundreds (thousands) of files like that anyway? Surely unified is a more useful approach? - Raz |