Date: Mon, 10 Apr 2000 01:31:39 -0700 From: Alfred Perlstein <bright@wintelcom.net> To: Bjoern Fischer <bfischer@Techfak.Uni-Bielefeld.DE> Cc: freebsd-hackers@FreeBSD.ORG Subject: Re: efficiency of maxproc hardlimit Message-ID: <20000410013139.R4381@fw.wintelcom.net> In-Reply-To: <20000410094436.A778@frolic.no-support.loc>; from bfischer@Techfak.Uni-Bielefeld.DE on Mon, Apr 10, 2000 at 09:44:36AM %2B0200 References: <20000410094436.A778@frolic.no-support.loc>
next in thread | previous in thread | raw e-mail | index | archive | help
* Bjoern Fischer <bfischer@Techfak.Uni-Bielefeld.DE> [000410 01:15] wrote:
> Hello,
>
> up till now I was convinced that a proper /etc/login.conf
> provides enough protection against silly dos efforts like
> fork bombs.
>
> Well, while a hard maxproc of 64 protects very well against
>
> echo '#!/bin/sh
> a &
> a &' > a; chmod 755 a; ./a
>
> but it fails to prevent that this
>
> main(){fork();main();}
>
> leaves the machine in an unusable state (it does ping
> back, one may break into the kernel debugger, but no
> io).
>
> Any way to prevent this (without harming the user)?
Please reread the documentation on limits.
cputime unlimited
filesize unlimited
datasize 256MB <-
stacksize 64MB <-
coredumpsize unlimited
memoryuse unlimited
memorylocked unlimited
maxproc 4115
descriptors 8232
sockbufsize unlimited
If appropriate limits are in place and you still get problems
then let us know.
--
-Alfred Perlstein - [bright@wintelcom.net|alfred@freebsd.org]
"I have the heart of a child; I keep it in a jar on my desk."
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000410013139.R4381>
