On Wed, Aug 08, 2001 at 01:15:31PM +0800, David Xu wrote:
> my opinion is don't use accept filter, it can become DOS attack target.
> sending a big http header and don't complete it, it does not let apache know a
>connection
> is already made and there is no timeout counter like which in Apache
Christopher Ellwood wrote:
>
> On Tue, 7 Aug 2001, Alfred Perlstein wrote:
>
> > This is somewhat true, however your machine seems to be configured
> > quite poorly.
> >
> > Having a low amount of NMBCLUSTERS (1024) and at the same time keeping
> > an unbounded (or at least large) listen queue (
On Tue, 7 Aug 2001, Alfred Perlstein wrote:
> This is somewhat true, however your machine seems to be configured
> quite poorly.
>
> Having a low amount of NMBCLUSTERS (1024) and at the same time keeping
> an unbounded (or at least large) listen queue (listen(fd,-1)) is
> not advised, especially
ch benifit.
--
David Xu
- Original Message -
From: "Christopher Ellwood" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Wednesday, August 08, 2001 12:42 PM
Subject: Problem with Code Red II and HTTP Accept Filtering
> The Code Red II worm seems to have a negativ
* Christopher Ellwood <[EMAIL PROTECTED]> [010807 23:42] wrote:
> The Code Red II worm seems to have a negative impact on FreeBSD machines
> with HTTP Accept Filtering enabled either statically in the kernel or via
> modules.
>
> The man page for accf_http states that:
>
> It prevents the a
The Code Red II worm seems to have a negative impact on FreeBSD machines
with HTTP Accept Filtering enabled either statically in the kernel or via
modules.
The man page for accf_http states that:
It prevents the application from receiving the connected descriptor via
accept() until eit