Hi there,
on Tuesday, June 13, 2006 at 1:16:48 PM there was posted:
RK> Is there work being done to prevent such DoS attacks?
Yes, on his "linuxtage" task Herbert mentioned this already beeing
fixed (minimum in development release) through "directory" limits to
be set on guest configurations (Herbert for sure will rely on this as
soon as he reads it).
This is not "only" a vserver DoS attack as far as I understood, this
is a general Linux issue I guess.
RK> I have to admit that I haven't tested this yet and it might just
RK> be FUD, but I thought that I might as well ask.
Unfortunately not, but as it is "just" a DoS thing and easy to find
the source, most users wouldn't issue it still. Anyhow, it is a risk
- and it (minimum in the near future) will / can be solved.
That's the good news 8-)
-- regards 'n greez, Guenther Fuchs (aka "muh" and "powerfox") _______________________________________________ Vserver mailing list Vserver@list.linux-vserver.org http://list.linux-vserver.org/mailman/listinfo/vserverReceived on Tue Jun 13 12:27:07 2006