Date: Wed, 25 Apr 2001 01:29:02 +0700 (NOVST) From: Max Khon <fjoe@newst.net> To: freebsd-stable@freebsd.org Subject: if_tap + nis Message-ID: <Pine.BSF.4.21.0104250116330.37191-100000@localhost>
next in thread | raw e-mail | index | archive | help
hi, there! We are experiencing the following problem: If NIS server is going down NIS client with if_tap.ko loaded causes ICMP and UDP flood (RPC requests) on NIS server when NIS server comes up. This leads to denial of service (portmap turns into fork bomb). Is there anyone experiencing the same problem? Is is possible to rate-limit RPC requests processing by portmap? NIS configuration is pretty simple: nis_server_enable="YES" nis_client_enable="YES" nis_client_flags="-ypsetme -s" in /etc/rc.conf on server side and nis_client_enable="YES" on client side. Client also has if_tap.ko loaded (vmware2 port installed with networking turned on, no bridging). client is running 4.2-STABLE (around January) server is running 4.3-RELEASE /fjoe To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0104250116330.37191-100000>