Anonymous | Login | Signup for a new account | 12-17-2024 11:00 PST |
Main | My View | View Issues | Change Log | Docs |
Viewing Issue Simple Details [ Jump to Notes ] | [ View Advanced ] [ Issue History ] [ Print ] | ||||||||
ID | Category | Severity | Reproducibility | Date Submitted | Last Update | ||||
0001351 | [Resin] | minor | always | 09-18-06 09:13 | 02-12-07 10:39 | ||||
Reporter | ferg | View Status | public | ||||||
Assigned To | ferg | ||||||||
Priority | normal | Resolution | fixed | ||||||
Status | closed | Product Version | |||||||
Summary | 0001351: improved DOS support | ||||||||
Description |
(rep by Matthias Jiderhamn) We are having some trouble with recurring DDoS/DoS attacks on one of our Resin servers. While being attacked, it seems most of the threads in the thread pool are connected but waiting for request input inside JNI code: com.caucho.vfs.JniStream.readNative(Native Method) com.caucho.vfs.JniStream.read(JniStream.java:98) com.caucho.vfs.ReadStream.readBuffer(ReadStream.java:922) com.caucho.vfs.ReadStream.waitForRead(ReadStream.java:289) com.caucho.server.port.TcpConnection.run(TcpConnection.java:386) com.caucho.util.ThreadPool.runTasks(ThreadPool.java:507) com.caucho.util.ThreadPool.run(ThreadPool.java:433) java.lang.Thread.run(Thread.java:595) Could setting a lower read-timeout (http://www.caucho.com/resin-3.0/config/tuning.xtp#Timeouts) [^] ease the effect? What would be sensible values? |
||||||||
Additional Information | |||||||||
Attached Files | |||||||||
|
Notes | |
(0001760) ferg 02-12-07 10:39 |
Added throttle-concurrent-max to <http>, e.g. <http port="80" throttle-concurrent-max="16"/> |
Mantis 1.0.0rc3[^]
Copyright © 2000 - 2005 Mantis Group
30 total queries executed. 26 unique queries executed. |