Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 3 Dec 1999 13:04:03 -0800 (PST)
From:      Alfred Perlstein <bright@wintelcom.net>
To:        Ferdinand Goldmann <ferdl@atommuell.oeh.uni-linz.ac.at>
Cc:        freebsd-stable@FreeBSD.ORG
Subject:   Re: Denial of Service attacks
Message-ID:  <Pine.BSF.4.21.9912031303330.4557-100000@fw.wintelcom.net>
In-Reply-To: <Pine.BSF.4.10.9912032130570.87104-100000@atommuell.oeh.uni-linz.ac.at>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 3 Dec 1999, Ferdinand Goldmann wrote:

> On Fri, 3 Dec 1999, Alfred Perlstein wrote:
> 
> > > I currently have no newer systems here to test it out, but someone with
> > > 3.3-STABLE or 4.0-CURRENT please test this...
> > 
> > There are now login limits to mbuf allocation to catch idiot users,
>             ^^^
> > an alternate and more effective approach is 'rmuser'.
> 
> Hmm.. Please define 'now'. I have just tried with the following resource 
> limits:
> 
> $ limits
> Resource limits (current):
> cputime          infinity secs
> filesize            51200 kb
> datasize            49152 kb
> stacksize           16384 kb
> coredumpsize        10240 kb
> memoryuse           49152 kb
> memorylocked        32768 kb
> maxprocesses           64
> openfiles             128
> 
> Still, it reboots....

you need a 3.3-stable or 4.0-current box, the login paramter is
'sbsize'

-Alfred



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-stable" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.9912031303330.4557-100000>