From owner-freebsd-hackers Thu Oct 23 14:40:59 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.7/8.8.7) id OAA29739 for hackers-outgoing; Thu, 23 Oct 1997 14:40:59 -0700 (PDT) (envelope-from owner-freebsd-hackers) Received: from smtp04.primenet.com (smtp04.primenet.com [206.165.5.85]) by hub.freebsd.org (8.8.7/8.8.7) with ESMTP id OAA29725 for ; Thu, 23 Oct 1997 14:40:31 -0700 (PDT) (envelope-from tlambert@usr05.primenet.com) Received: (from daemon@localhost) by smtp04.primenet.com (8.8.7/8.8.7) id OAA27908; Thu, 23 Oct 1997 14:40:18 -0700 (MST) Received: from usr05.primenet.com(206.165.6.205) via SMTP by smtp04.primenet.com, id smtpd027906; Thu Oct 23 14:40:13 1997 Received: (from tlambert@localhost) by usr05.primenet.com (8.8.5/8.8.5) id OAA07475; Thu, 23 Oct 1997 14:40:10 -0700 (MST) From: Terry Lambert Message-Id: <199710232140.OAA07475@usr05.primenet.com> Subject: Re: CHILD_MAX no longer valid in 2.2.5-RELEASE? To: jbryant@tfs.net Date: Thu, 23 Oct 1997 21:40:10 +0000 (GMT) Cc: tlambert@primenet.com, freebsd-hackers@freebsd.org In-Reply-To: <199710232004.PAA15951@argus.tfs.net> from "Jim Bryant" at Oct 23, 97 03:04:33 pm X-Mailer: ELM [version 2.4 PL23] Content-Type: text Sender: owner-freebsd-hackers@freebsd.org X-Loop: FreeBSD.org Precedence: bulk > > Out of curiosity, what is the function of establishing a limit on rc > > itself, as opposed to only the things rc runs? > > root's login.conf??? If I'm root, I should be able to shoot myself in the foot if I want to. I understand the denial of service aspects for non-root users shooting each other in the foot, and the daemon aspects as regards daemons that malfunction. But root has a moral obligation to let me aim at my foot. So I'd still like to know the function of establishing a limit on rc itself... Terry Lambert terry@lambert.org --- Any opinions in this posting are my own and not those of my present or previous employers.