On 24/03/2021 09:31, Petr Štetiar wrote:
> Arnout Vandecappelle (Essensium/Mind) <arn...@mind.be> [2021-03-23 16:23:25]:
> 
> Hi,
> 
>> Note that this infinite tx_queue opens the door to a DoS attack.
> 
> memory is not infinite, so I think, that some sensible upper limit should be
> kept. It might be much higher by default since it's dynamic now, but still
> should be capped and lifted if needed.

 I agree, however:

- the limit should be a global one (not per client);
- it should take into account Rx, Tx and monitor buffers;
- it's not exactly simple to implement (or I don't see a simple way to implement
it);
- I don't have time to work on this;
- it's anyway a rather theoretical issue which already exists anyway, as
explained in the commit message;
- the fix is fixing an actual use case that is not theoretical at all (as in, we
have a device that doesn't boot due to this issue).

 Regards,
 Arnout

_______________________________________________
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/mailman/listinfo/openwrt-devel

Reply via email to