Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 7 Aug 1998 09:17:14 -0700 (PDT)
From:      Tom <tom@uniserve.com>
To:        Mark Huizer <freebsd@xaa.iae.nl>
Cc:        freebsd-current@FreeBSD.ORG
Subject:   Re: memory leaks in libc
Message-ID:  <Pine.BSF.3.96.980807091532.17170A-100000@shell.uniserve.ca>
In-Reply-To: <19980807154721.A865@xaa.iae.nl>

next in thread | previous in thread | raw e-mail | index | archive | help

On Fri, 7 Aug 1998, Mark Huizer wrote:

> > > Hmm... then we should write a nice DoS attack for apache, would that be a
> > > reason for solving it?
> > 
> >   Couldn't be done.  CGI scripts are so short lived, that that memory gets
> > cleaned up on its own anyhow.  Perhaps specific a DoS attack could be
> > tailored to a specific CGI script, but I would argue that the CGI script
> > is broken.  CGI is used less and less anyhow, as peole use better and
> > faster methods of server side scripting.
> > 
> OK, how come a poor little apache server doesn't like this:
> 
> GET / HTTP/1.0
> User-Agent: a
> User-Agent: aaaaaaaaaaaaaaaaaaaaaa
> (repeat last 2 lines 20000 times)
> (empty line)
> 
> apache on a Linux machine here is still thinking about wheterh or not to 
> return 100M, time to test it on my home FreeBSD server :-)

  Really nothing to do with setenv/putenv (which Apache doesn't even use).

  

> Mark
> -- 
> Nice testing in little China...

Tom


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-current" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.980807091532.17170A-100000>