In some mail from Karl Pielorz, sie said:
> 
> Darren Reed wrote:
> 
> > > It is evil connection. Good applications do read data from their sockets,
> > > and evil ones do not. And ever if it is good, but silly or busy
> > > application, good clients do not send so much data that application
> > > can not process it. Am I wrong, there are any examples?
> > 
> > So what if someone manages to crash a program due to a DOS attack ?
> > An easy one that comes to mind is syslogd.  It's often stuck in disk-wait
> > and can easily be targetted with a large number of packets.
> 
> Isn't syslog UDP? - i.e. no ACK? - you could argue (to a point) that this
> might even be by design? :) (with regard to if syslog is in diskwait, and over
> burdened with traffic, data gets dropped). This, could be construed as a DoS
> (in fact it probably is)...

sorry, syslogd doesn't suffer from the same problems that klogd on lamix
does (i.e its all datagrams).  my mistake.



To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message

Reply via email to