Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 04 Dec 1999 13:15:54 GMT
From:      mike@sentex.net (Mike Tancsa)
To:        danh@wzrd.com (Dan Harnett)
Cc:        freebsd-security@freebsd.org
Subject:   Re: Other outstanding vulnerabilities
Message-ID:  <384913e7.733706143@mail.sentex.net>
In-Reply-To: <MAIL19991203153353.5FB085D026@mail.wzrd.com>
References:  <3.0.5.32.19991202154308.01bc93c0@staff.sentex.ca> <MAIL19991203153353.5FB085D026@mail.wzrd.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On 3 Dec 1999 10:34:35 -0500, in sentex.lists.freebsd.misc you wrote:

>Hello,
>
>It has been my experience that the setsockopt() DoS can be avoided by setting
>NMBCLUSTERS to a reasonably high level and setting a limit on the number of

Hi,
	Whats a reasonably high number ?

Thanks,

	---Mike
Mike Tancsa  (mdtancsa@sentex.net)		
Sentex Communications Corp,   		
Waterloo, Ontario, Canada
"Given enough time, 100 monkeys on 100 routers 
could setup a national IP network." (KDW2)


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?384913e7.733706143>