Re: contrib: auth_delay module

Поиск
Список
Период
Сортировка
От Jeff Janes
Тема Re: contrib: auth_delay module
Дата
Msg-id AANLkTimhxW0TaHDsPnsV=18=GHVFXvZ68G_UES=HGZGS@mail.gmail.com
обсуждение исходный текст
Ответ на Re: contrib: auth_delay module  (Robert Haas <robertmhaas@gmail.com>)
Ответы Re: contrib: auth_delay module  (Robert Haas <robertmhaas@gmail.com>)
Список pgsql-hackers
On Sun, Nov 28, 2010 at 5:38 AM, Robert Haas <robertmhaas@gmail.com> wrote:
> On Sat, Nov 27, 2010 at 2:44 PM, Jeff Janes <jeff.janes@gmail.com> wrote:

>> I haven' t thought of a way to test this, so I guess I'll just ask.
>> If the attacking client just waits a few milliseconds for a response
>> and then drops the socket, opening a new one, will the server-side
>> walking-dead process continue to be charged against max_connections
>> until it's sleep expires?
>
> I'm not sure, either.  I suspect the answer is yes.  I guess you could
> test this by writing a loop like this:
>
> while true; do psql <connection parameters that will fail authentication>; done
>
> ...and then hitting ^C every few seconds during execution.  After
> doing that for a bit, run select * from pg_stat_activity or ps auxww |
> grep postgres in another window.

Right, I didn't think of using psql, I thought I'd have to wrangle my
own socket code.

I wrote up a perl script that spawns psql and immediately kills it.  I
quickly start getting "psql: FATAL:  sorry, too many clients already"
errors.  And that condition doesn't clear until the sleep expires on
the earliest ones spawned.

So it looks like the max_connections is charged until the auth_delay expires.

Cheers,

Jeff


В списке pgsql-hackers по дате отправления:

Предыдущее
От: Kenneth Marshall
Дата:
Сообщение: Re: Report: Linux huge pages with Postgres
Следующее
От: Robert Haas
Дата:
Сообщение: Re: profiling connection overhead