Fork bombing a Linux machine as a non-root user
David Curry
dsccable at comcast.net
Mon Mar 21 07:49:14 UTC 2005
Les Mikesell wrote:
Just read your comments below, Les. The list deserves a response but it
will have to wait. Your views don't deserve any of my early a.m. time.
>On Sat, 2005-03-19 at 21:29, David Curry wrote:
>
>
>>>No, the assumption is that the person installing the OS, expert or
>>>not, knows more about it's capabilities than the person who
>>>built the distribution that will run on anything from a P100
>>>or less to a multi-cpu, multi-Ghz box.
>>>
>>>
>>>
>>Your interpretation would be much better supported if there was some
>>documentation available to that "person installing the OS" which
>>informed them of the default installation settings and advisability of
>>resetting for specific installation characteristics.
>>
>>
>
>I simply can't believe that anyone who is obviously on the
>internet and capable of joining a mailing list can possibly
>think there is any lack of documentation available. It is true
>that a free product generally does not come with a marketing
>force that will take you to lunch or golf and hold your hand
>while you learn about the product, but the ulimit concept has
>been documented for anyone who cares to read about it long
>before Linux was even around (remember how Linux is a free
>implementation of the unix API...).
>
>
>
>>This argument overlooks the specifc kind of concern that prompted the
>>thread originating author to pose his question. Namely, vulnerability
>>of the system to fork bombing if it is hacked.
>>
>>
>
>Well, OK - don't get hacked. A fork bomb is one of the least
>destructive things a hacker could do once in. Keep your system
>updated and you are unlikely to have a vulnerability exploited.
>Keep your password to yourself, don't write it down, and don't
>use it over public unencrypted connections.
>
>
>
>>>You are the one making the wrong assumption if you think the OS
>>>distributors know more about how *your* PC's resources should be
>>>used or how much you trust the other users on your machine.
>>>
>>>
>>>
>>>
>>>
>>See my responses to your two preceeding assertions.
>>
>>
>
>I saw them, but they do nothing to address the point that no one
>else can understand your situation to pick appropriate limits.
>
>
>
>>Second guessing an ops "decision to start an inefficiently large number
>>of processes" would be to predetermine limits below capacity and not
>>provide a means of changing them. Setting installation default at a
>>level large enough to handle installation while providing both advice of
>>those default settings and a means of changing them to suit the user
>>would be prudent as well as rational. It would be better practice Red
>>Hat/Fedora than has been followed in the past.
>>
>>
>
>That would be like buying a car that would not go above 5 mph until
>you prove your proficiency under the hood to remove the limit. While
>it might be a good practice for some definition of the term, it isn't
>what anyone would expect.
>
>
>
>>Is it a fact that 'fork bombs' require "login/password access ... to set
>>them off." We recently read here on fedora-list about a system that had
>>been taken over and was being used without authorization as a mail
>>server. A script of unknown original found in the /tmp directory set up
>>the service.
>>
>>
>
>Breakins are equivalent to gaining a login/password. Finding out about
>it through a system crash or slowdown is probably better than letting
>an outsider continue to use your system resources and likely intercept
>logins and passwords you are using in your outbound connections to
>other sites. In other words, the fork bomb potential is the least of
>your problems after a breakin.
>
>
>
>>Controling system access is the objective. But, doesn't it make sense
>>to maintain multi-layered defenses so if the outer perimeter is breached
>>more hurdles exist to thwart stealth attackers?
>>
>>
>
>It doesn't make sense to impose limits on the legitimate user(s) of the
>system by default. Did you pay for those hardware resources just to
>be prevented from using them to their limits?
>
>
>
>>And, to limit the chances of anyone else breaching my system's security
>>and damaging my system, I have now established new, lower resource
>>allocation limits in addition to other measures. I have turned off all
>>the services I do not need, my broadband modem is placed in standby mode
>>whenever I do not intend to access the internet, my system is turned off
>>if I am going to be away from it for any period of time while someone else
>>has access to the machine.
>>
>>
>
>Now add regular backups on media taken to another location to that and
>you can consider your files to be pretty safe. Otherwise hardware
>failure or operator error are still your most likely ways to lose
>data. Personally I'd take the risk of leaving ssh connections
>available from outside if you ever have any reason to need it.
>There have been exploits in the past but if you keep your system
>updated there should not be much risk now.
>
>
>
More information about the fedora-list
mailing list