Date: Wed, 31 May 2017 14:48:09 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-net@FreeBSD.org Subject: [Bug 219655] TCP Connection Limit Error - sonewconn: Listen queue overflow Message-ID: <bug-219655-2472-OGFjEEtTHv@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-219655-2472@https.bugs.freebsd.org/bugzilla/> References: <bug-219655-2472@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D219655 Bjoern A. Zeeb <bz@FreeBSD.org> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |bz@FreeBSD.org --- Comment #12 from Bjoern A. Zeeb <bz@FreeBSD.org> --- Making these variables per-VNET is not necessarily a good idea; it means a VNET-jail consumer could possibly DoS the system without the administrator having a chance to prevent this easily by exceeding resources. Need to be very careful. I'd hope if this should go into HEAD that there'l= l be a way to "cap" the values or reject excessive requests by some metric at le= ast. --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-219655-2472-OGFjEEtTHv>