Date: Fri, 22 May 2009 17:34:21 +0200 From: =?utf-8?Q?Dag-Erling_Sm=C3=B8rgrav?= <des@des.no> To: John Baldwin <jhb@freebsd.org> Cc: svn-src-head@freebsd.org, Rick Macklem <rmacklem@freebsd.org>, svn-src-all@freebsd.org, Rick Macklem <rmacklem@uoguelph.ca>, src-committers@freebsd.org Subject: Re: svn commit: r192463 - head/sys/fs/nfsserver Message-ID: <8663ftw3r6.fsf@ds4.des.no> In-Reply-To: <200905221118.48669.jhb@freebsd.org> (John Baldwin's message of "Fri, 22 May 2009 11:18:48 -0400") References: <200905201858.n4KIw7Fc040619@svn.freebsd.org> <86r5yhzaso.fsf@ds4.des.no> <Pine.GSO.4.63.0905221024420.105@muncher.cs.uoguelph.ca> <200905221118.48669.jhb@freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
John Baldwin <jhb@freebsd.org> writes: > What about a malicious denial-of-service attack where a malicious client= =20 > initiates an endless stream of connection attempts to force a panic? I t= hink=20 > that is where the concern lies. I'm sure a malicious client could do it= =20 > intentionally in less than 136 years, perhaps on the order of seconds and= /or=20 > minutes? :) Not quite - 49 days at 1,000 requests per second. I agree that it's very unlikely, but the idea of a cpu_reboot() just rubs me the wrong way. We're painting bikesheds here, though. DES --=20 Dag-Erling Sm=C3=B8rgrav - des@des.no
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?8663ftw3r6.fsf>