[7684] in bugtraq

home help back first fref pref prev next nref lref last post

Re: YA Apache DoS attack

daemon@ATHENA.MIT.EDU (Marc Slemko)
Sun Aug 16 15:51:00 1998

Date: 	Sat, 15 Aug 1998 21:10:52 -0700
Reply-To: Marc Slemko <marcs@ZNEP.COM>
From: Marc Slemko <marcs@ZNEP.COM>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <35D63E5E.A961C9C2@webfx.ca>

On Sat, 15 Aug 1998, Scott Burke wrote:

> Kovacs Andrei wrote:
>
> > On Fri, 7 Aug 1998, Dag-Erling Coidan [ISO-8859-1] Sm=F8rgrav wrote=
:
> >
> >         Today when I was looking at the Apache 1.3.1 help files i'v=
e
> > found a
> > parameter that might stop this: "RLimitMem". I guess this should ma=
ke
> > Apache
> > use only the amount of memory that you want to.
> >
> >         Andy
>
>    That will limit the amount of memory consumed by Apache itself, wh=
ich
> will
> save your whole system from being DoS'd, but the server itself will
> still be
> able to be DoS'd. That merely compartmentalizes the damage :)

No, this will not do anything against this attack.

The RLimit* directives only impact the amount of memory used by other
processes (eg. CGIs) that Apache spawns.

As I originally posted, if you want to prevent Apache from eating memor=
y
simply set the appropriate ulimit before starting Apache.

It isn't a denial of service attack if there is no denial of service.  =
If
you have the appropriate ulimits, then on many machine a single attack
will not deny any service.  Then it becomes a game of sending multiple
ones at the same time, etc.

home help back first fref pref prev next nref lref last post