public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* fork()
@ 2005-03-24 16:45 redoubtable
  2005-03-24 18:17 ` fork() Triffid Hunter
  0 siblings, 1 reply; 3+ messages in thread
From: redoubtable @ 2005-03-24 16:45 UTC (permalink / raw)


Hey,

I read a document on securityfocus about fork bombinb a linux system. 
Although they didn't speak about the effectiveness of resource limits I 
guess that should be discussed because it's possible to make a linux 
machine extremely slow (compared to FreeBSD for instance) even with well 
configured resource limits.
I revised kernel/fork.c and I found a way to prevent this problem by 
removing all associated processes with the parent, but that's far from 
portable and should not be used for the sake of compatibilities. I guess 
the function fork() should be revised.
And what about creating a 'maxprocs' sysctl var (even if left high) when 
the resource limits problem is fixed? It would help security when it is 
needed and wouldn't bother other applications. RLIMITs on login are not 
trustworthy. It should exist a global limit in case someone could spawn 
a shell without limits through some flawed application.

Thanks, and please advise.


^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2005-03-25  7:28 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2005-03-24 16:45 fork() redoubtable
2005-03-24 18:17 ` fork() Triffid Hunter
2005-03-25  7:28   ` fork() Natanael Copa

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox