Hello.

I recently saw this article: http://networkpenetration.com/fd.html

It describes how to DoS OpenBSD by using all available file descriptors,
this is done by serveral processes.

It can't be done with only one process, because of the "openfiles"
limit. But thats no problem - a user of the login class "default" is
allowed to have up to 128 processes, each may have 64 descriptors. Thats
about 8000 file descriptors - for one user of the login class default.

kern.maxfiles=1772 seems to be the limit of file descriptors concerning
the system. If this limit is reached, nobody can work anymore, because
nobody can open any files. Even root just can't login, because there is
no file handle to open the libc shared library.

I tested this issue on two different machines, it works for me.

I increased kern.maxfiles to 16.000 and limited macproc to 64 to
prevent one user of the login class "default" to stop my hole system.

Would it be nice to change this per default to achieve the ideal of
being "secure by default"?

Has such a high kern.maxfiles disadvantages?

Did i miss something?

Regards
Jonathan

--
 | /"\   ASCII Ribbon   | Jonathan Glaschke - Lorenz-Goertz-Stra_e 71,
 | \ / Campaign Against | 41238 Moenchengladbach, Germany;
 |  X    HTML In Mail   | jabber: [EMAIL PROTECTED]
 | / \     And News     | http://jonathan-glaschke.de/

[demime 1.01d removed an attachment of type application/pgp-signature]

Reply via email to