From mboxrd@z Thu Jan 1 00:00:00 1970 From: bill@cs.uofs.edu (Bill Gunshannon) Date: Thu, 5 Oct 2006 10:33:19 -0400 (EDT) Subject: [pups] User Mode DoS Attacks (was Re: Issues of AUUGN) In-Reply-To: References: Message-ID: <4672.134.198.172.102.1160058799.squirrel@www.cs.scranton.edu> >> But you'd need kernel mode for that; this is a DoS attack (one of the >> first?) launched by a user. > > The userland DoS I remember: > > main() { > while(1) > fork(); > } Typical "Rabbit Program". > > And in fact I tried it once on the 11/45 I had access to. Not pretty. > It can be made less disastrous by judicious addition of a wait(); call. > > --Milo, wondering how contemporary UNIX will deal with such > pathological behavior.... Not necessarily pathological. I have students do it all the time in the early parts of the Operating Systems Course. The only one it denies service to on contemorary UNIX is the individual who does it. Process limits are by user, not by system. bill -- Bill Gunshannon | de-moc-ra-cy (di mok' ra see) n. Three wolves bill at cs.scranton.edu | and a sheep voting on what's for dinner. University of Scranton | Scranton, Pennsylvania | #include