Hi there, on Tuesday, June 13, 2006 at 1:16:48 PM there was posted:
RK> Is there work being done to prevent such DoS attacks? Yes, on his "linuxtage" task Herbert mentioned this already beeing fixed (minimum in development release) through "directory" limits to be set on guest configurations (Herbert for sure will rely on this as soon as he reads it). This is not "only" a vserver DoS attack as far as I understood, this is a general Linux issue I guess. RK> I have to admit that I haven't tested this yet and it might just RK> be FUD, but I thought that I might as well ask. Unfortunately not, but as it is "just" a DoS thing and easy to find the source, most users wouldn't issue it still. Anyhow, it is a risk - and it (minimum in the near future) will / can be solved. That's the good news 8-) -- regards 'n greez, Guenther Fuchs (aka "muh" and "powerfox") _______________________________________________ Vserver mailing list Vserver@list.linux-vserver.org http://list.linux-vserver.org/mailman/listinfo/vserver