Date: Fri, 3 Dec 1999 13:04:03 -0800 (PST) From: Alfred Perlstein <bright@wintelcom.net> To: Ferdinand Goldmann <ferdl@atommuell.oeh.uni-linz.ac.at> Cc: freebsd-stable@FreeBSD.ORG Subject: Re: Denial of Service attacks Message-ID: <Pine.BSF.4.21.9912031303330.4557-100000@fw.wintelcom.net> In-Reply-To: <Pine.BSF.4.10.9912032130570.87104-100000@atommuell.oeh.uni-linz.ac.at>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 3 Dec 1999, Ferdinand Goldmann wrote: > On Fri, 3 Dec 1999, Alfred Perlstein wrote: > > > > I currently have no newer systems here to test it out, but someone with > > > 3.3-STABLE or 4.0-CURRENT please test this... > > > > There are now login limits to mbuf allocation to catch idiot users, > ^^^ > > an alternate and more effective approach is 'rmuser'. > > Hmm.. Please define 'now'. I have just tried with the following resource > limits: > > $ limits > Resource limits (current): > cputime infinity secs > filesize 51200 kb > datasize 49152 kb > stacksize 16384 kb > coredumpsize 10240 kb > memoryuse 49152 kb > memorylocked 32768 kb > maxprocesses 64 > openfiles 128 > > Still, it reboots.... you need a 3.3-stable or 4.0-current box, the login paramter is 'sbsize' -Alfred To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.9912031303330.4557-100000>