Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 10 Apr 2000 01:31:39 -0700
From:      Alfred Perlstein <bright@wintelcom.net>
To:        Bjoern Fischer <bfischer@Techfak.Uni-Bielefeld.DE>
Cc:        freebsd-hackers@FreeBSD.ORG
Subject:   Re: efficiency of maxproc hardlimit
Message-ID:  <20000410013139.R4381@fw.wintelcom.net>
In-Reply-To: <20000410094436.A778@frolic.no-support.loc>; from bfischer@Techfak.Uni-Bielefeld.DE on Mon, Apr 10, 2000 at 09:44:36AM %2B0200
References:  <20000410094436.A778@frolic.no-support.loc>

next in thread | previous in thread | raw e-mail | index | archive | help
* Bjoern Fischer <bfischer@Techfak.Uni-Bielefeld.DE> [000410 01:15] wrote:
> Hello,
> 
> up till now I was convinced that a proper /etc/login.conf
> provides enough protection against silly dos efforts like
> fork bombs.
> 
> Well, while a hard maxproc of 64 protects very well against
> 
>   echo '#!/bin/sh
>   a &
>   a &' > a; chmod 755 a; ./a
> 
> but it fails to prevent that this
> 
>   main(){fork();main();}
> 
> leaves the machine in an unusable state (it does ping
> back, one may break into the kernel debugger, but no
> io).
> 
> Any way to prevent this (without harming the user)?

Please reread the documentation on limits.

cputime         unlimited
filesize        unlimited
datasize        256MB       <-
stacksize       64MB        <-
coredumpsize    unlimited
memoryuse       unlimited
memorylocked    unlimited
maxproc         4115
descriptors     8232
sockbufsize     unlimited

If appropriate limits are in place and you still get problems
then let us know.

-- 
-Alfred Perlstein - [bright@wintelcom.net|alfred@freebsd.org]
"I have the heart of a child; I keep it in a jar on my desk."


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000410013139.R4381>