Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 2 Jun 2000 14:49:54 -0700
From:      Alfred Perlstein <bright@wintelcom.net>
To:        Ussr Labs <labs@USSRBACK.COM>
Cc:        BUGTRAQ@SECURITYFOCUS.COM
Subject:   Re: Local FreeBSD, Openbsd, NetBSD, DoS Vulnerability
Message-ID:  <20000602144954.Q17973@fw.wintelcom.net>
In-Reply-To: <NCBBKFKDOLAGKIAPMILPCEJLCEAA.labs@ussrback.com>; from labs@USSRBACK.COM on Wed, Aug 02, 2000 at 08:41:53AM -0300
References:  <NCBBKFKDOLAGKIAPMILPCEJLCEAA.labs@ussrback.com>

next in thread | previous in thread | raw e-mail | index | archive | help
* Ussr Labs <labs@USSRBACK.COM> [000602 13:08] wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Local FreeBSD, Openbsd, NetBSD, DoS Vulnerability

[snip same old story about exhausting mbufs]

FreeBSD 4 and above are not vulnerable if proper limits are put
into place.  These limits should be setup at the same time other
limits (such as 'maxproc' to disallow forkbombing) are set up.

Please see the the RLIMIT_SBSIZE option for setrlimit(2), it allows
a reasonable limit to be set for users socket buffers.

An undocumeted (which I just fixed) option for login.conf(5) 'sbsize'
allows this restriction to be put into place for users:

        :sbsize=1048576:\

Of course the real solution is rmuser(8), but that's a matter of
policy.

hope this helps,
--
-Alfred Perlstein - [bright@wintelcom.net|alfred@freebsd.org]
"I have the heart of a child; I keep it in a jar on my desk."



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000602144954.Q17973>