On Thu, 14 Aug 2003, Rob Siemborski wrote: > On Thu, 14 Aug 2003, Per Steinar Iversen wrote: > > > > Well not great, but most people don't go around investigating seen state > > > for bogus users. > > > > These files consume diskspace. Call fud a sufficent number of times, each > > time with a different name and eventually these files will consume all > > available space. Also some filesystems, like ext2/3, have performance > > problems with directories containing huge numbers of files. > > Of course they do. So don't go around opening the seen data for users > that don't exist! ;) > > -Rob > > -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- > Rob Siemborski * Andrew Systems Group * Cyert Hall 207 * 412-268-7456 > Research Systems Programmer * /usr/contributed Gatekeeper
And no access to fud over the network - that would seem to for open a very simple DOS exploit. -psi