On Mon, 2006-07-10 at 13:29 -0700, Rob Schoening wrote: > but my question is really: how vulnerable is "mtn serve" today to DoS > and buffer overrun type exploits?
DoS: It'd be fairly simple to make monotone eat all your CPU (or on an SMP box, as much CPU as a single-threaded program can eat). If you give someone write access, they can also fill up your disk. Buffer overrun: We tend to not use fixed-size buffers, so I don't think this is terribly likely. Tim _______________________________________________ Monotone-devel mailing list Monotone-devel@nongnu.org http://lists.nongnu.org/mailman/listinfo/monotone-devel