From owner-freebsd-security Thu Nov 21 13:22:59 2002 Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 0597137B401 for ; Thu, 21 Nov 2002 13:22:58 -0800 (PST) Received: from out5.mx.nwbl.wi.voyager.net (out5.mx.nwbl.wi.voyager.net [169.207.3.123]) by mx1.FreeBSD.org (Postfix) with ESMTP id 7B8D243E6E for ; Thu, 21 Nov 2002 13:22:57 -0800 (PST) (envelope-from silby@silby.com) Received: from [10.1.1.6] (d69.as9.nwbl0.wi.voyager.net [169.207.132.197]) by out5.mx.nwbl.wi.voyager.net (Postfix) with ESMTP id 670A4C6C4F; Thu, 21 Nov 2002 15:22:55 -0600 (CST) Date: Thu, 21 Nov 2002 15:29:04 -0600 (CST) From: Mike Silbersack To: "David G. Andersen" Cc: freebsd-security@freebsd.org Subject: Re: File table exhaustion patch In-Reply-To: <20021121105204.B75421@cs.utah.edu> Message-ID: <20021121152539.U44884-100000@patrocles.silby.com> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org On Thu, 21 Nov 2002, David G. Andersen wrote: > In PR 45353, I've submitted a patch to reserve a handfull of > file table entries for root-only use, to mitigate the effects > of user processes that leak file descriptors: > > http://www.freebsd.org/cgi/query-pr.cgi?pr=45353 > > Even with per-process file descriptor limits, it's pretty > easy for a buggy program that does any kind of forking to > run the system out of file table entries (or for a malicious > user to do so). The patch above is trivial, and at least > enables root to login and fix things up a bit. I've been > running it locally for about a week, and it's happy. > > Is the form of the solution acceptable? (And if so, anyone > interested in committing it to -current for a while? ;-) > > -Dave Your patch looks good, I think it could probably go in without any modifications. HOWEVER, we're in a code freeze leading up to 5.0-release, and local DoSes aren't a critical bug. Hence, I'm going to wait until after 5.0-release is out the door before I go ahead with committing your patch. Mike "Silby" Silbersack To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message