On Fri, 8 Oct 2010 17:43:44 -0400
Simon Wilkinson <s...@inf.ed.ac.uk> wrote:

> On 8 Oct 2010, at 17:24, Andrew Deason wrote:
> 
> > This is probably the throttling behavior of the fileserver, where
> > the fileserver throttles client activity if it sends too many RPCs
> > that return error codes in a certain amount of time.

Actually, this is a per-connection (and per-call) count, IIRC; it's not
within a certain amount of time and it never goes down unless you get a
new conn.

> I do wonder if the abort threshold is too aggressive when applied to
> authenticated clients. Whilst a denial of service attack is possible
> from authenticated clients, it's also more likely that there will be
> administrative means available to track down and punish offenders.

Yeah, I agree with the general idea. I'm not sure if just increasing the
threshold is good enough, since once you hit it the performance just
goes straight to N req/s (right now N=1, I think) effectively forever as
long as you're constantly using the conn. Maybe we should also change
the throttled rate, or just reset the count after a certain amount of
time (which would effectively do the same thing amortized).

Although, just a separate thresh is a lot easier, and being able to
configure '-aborttreshold 0' just for auth'd conns would be nice.

> Maybe we need two different thresholds depending on the class of the
> client.

Or maybe N thresholds, for any of the existing or future security class
indices? (This sounds annoying to tweak via command line arguments; when
are we getting a config file again? ;)

-- 
Andrew Deason
adea...@sinenomine.net

_______________________________________________
OpenAFS-info mailing list
OpenAFS-info@openafs.org
https://lists.openafs.org/mailman/listinfo/openafs-info

Reply via email to