Date: Fri, 7 Aug 1998 09:17:14 -0700 (PDT) From: Tom <tom@uniserve.com> To: Mark Huizer <freebsd@xaa.iae.nl> Cc: freebsd-current@FreeBSD.ORG Subject: Re: memory leaks in libc Message-ID: <Pine.BSF.3.96.980807091532.17170A-100000@shell.uniserve.ca> In-Reply-To: <19980807154721.A865@xaa.iae.nl>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 7 Aug 1998, Mark Huizer wrote: > > > Hmm... then we should write a nice DoS attack for apache, would that be a > > > reason for solving it? > > > > Couldn't be done. CGI scripts are so short lived, that that memory gets > > cleaned up on its own anyhow. Perhaps specific a DoS attack could be > > tailored to a specific CGI script, but I would argue that the CGI script > > is broken. CGI is used less and less anyhow, as peole use better and > > faster methods of server side scripting. > > > OK, how come a poor little apache server doesn't like this: > > GET / HTTP/1.0 > User-Agent: a > User-Agent: aaaaaaaaaaaaaaaaaaaaaa > (repeat last 2 lines 20000 times) > (empty line) > > apache on a Linux machine here is still thinking about wheterh or not to > return 100M, time to test it on my home FreeBSD server :-) Really nothing to do with setenv/putenv (which Apache doesn't even use). > Mark > -- > Nice testing in little China... Tom To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.980807091532.17170A-100000>