Re: Patch Related with Fork Bombing Attack

2007-07-15 Thread Simon Arlott
On 13/07/07 13:39, Anand Jahagirdar wrote: > This patch Warns the administrator about the fork bombing attack > (whenever any user is crossing its process limit). I have used > +printk(KERN_WARNING "User with uid %u is > crossing the process limi

Re: Patch Related with Fork Bombing Attack

2007-07-14 Thread WANG Cong
On Fri, Jul 13, 2007 at 06:09:02PM +0530, Anand Jahagirdar wrote: >Hello All {snip} >Index: root/Desktop/a1/linux-2.6.17.tar.bz2_FILES/linux-2.6.17/kernel/fork.c >=== >--- root.orig/Desktop/a1/linux-2.6.17.tar.bz2_FILES/linux-2.6.17/

Patch Related with Fork Bombing Attack

2007-07-13 Thread Anand Jahagirdar
: This patch Warns the administrator about the fork bombing attack (whenever any user is crossing its process limit). I have used printk_ratelimit function in this patch. This function helps to prevent flooding of syslog and prints message as per the values set by root user in following files:- 1) /proc

Re: Patch Related With Fork Bombing Attack

2007-06-27 Thread Bodo Eggert
(not CCing security, since it's not a security bug and it's too late to verify if they should be on cc. Will do later.) Anand Jahagirdar <[EMAIL PROTECTED]> wrote: > This patch Warns the administrator about the fork bombing attack > (whenever any user is crossing its proce

Patch Related With Fork Bombing Attack

2007-06-26 Thread Anand Jahagirdar
Hello All As per the discussion in the thread with subject as Patch Related with Fork Bombing Attack on LKML,I have modified my patch. I request you for the inclusion of my attached patch named "fork.patch". Summery of the Patch: This patch Warns the administrator abou

Re: Fork Bombing Attack

2007-05-22 Thread Mark Lord
Anand Jahagirdar wrote: Hello All I tried to execute a program which creates 8152 process.( i=0; while( i<14) i++ fork(); ) with ulimit 8200. This program created 8152 processes and then stopped and came back to command prompt. this proves that my machine do have sufficient resources t

Re: Fork Bombing Attack

2007-05-18 Thread Bernd Eckenfels
In article <[EMAIL PROTECTED]> you wrote: > I found one more interesting thing related with fork > bombing attack. i have set following in /etc/security/limits.conf file > > [EMAIL PROTECTED]hard nproc 3000 > [EMAIL PROTECTED] hard nproc 500 The # i

Re: Fork Bombing Attack

2007-05-18 Thread Krzysztof Halasa
> output is 8050. when root or any other user changes ulimit by typing > "ulimit -u value",.ulimit value is changed for that session and not > permantely. actually ulimit should help to prevent fork bombing attack > but it wont and fork bombing attack still take down th

Re: Fork Bombing Attack

2007-05-18 Thread Valdis . Kletnieks
s children. Or more correctly, those children that don't themselves change the value again - the distinction is crucial in this case. > actually ulimit should help to prevent fork bombing attack Right. It *helps* prevent it. But it isn't by itself a total cure. > but it

Re: Fork Bombing Attack

2007-05-18 Thread Anand Jahagirdar
Hello All I found one more interesting thing related with fork bombing attack. i have set following in /etc/security/limits.conf file [EMAIL PROTECTED]hard nproc 3000 [EMAIL PROTECTED] hard nproc 500 I have tried to execute fork bombing program on the same machine. it

Re: Fork Bombing Attack

2007-05-18 Thread Ahmed S. Darwish
terminal with guest account and this fork bombing attack killed the box completely and machine needed reboot. I think if you want resource limiting per _UID_ (and not per _process_ as you did), you should use PAM module pam_limits.so. You can edit those limits using the file /etc/security/l

Re: Fork Bombing Attack

2007-05-18 Thread Michael Tokarev
on another terminal with guest account and this fork bombing attack > killed the box completely and machine needed reboot. Do you know ulimits are a *process* property, not uid property? That is, if, in some process of a giving user, you set ulimit value, it does NOT affect other processes of

Re: Fork Bombing Attack

2007-05-18 Thread Anand Jahagirdar
d not able to fork another single process when it reaches to 100 processes count. actual result :- kernel allow me to create another processes without giving error. due to this i tried to execute same fork bombing program on another terminal with guest account and this fork bombing attack k

Re: Fork Bombing Attack

2007-05-17 Thread Valdis . Kletnieks
On Thu, 17 May 2007 20:15:32 +0530, Anand Jahagirdar said: > Hello All > I have set per user process limit ( ulimit) for both > root and guest account as 8000 by using option ulimit -u 8000.this is > Hard limit. still fork bombing attack killed the box and machine >

Fork Bombing Attack

2007-05-17 Thread Anand Jahagirdar
Hello All I have set per user process limit ( ulimit) for both root and guest account as 8000 by using option ulimit -u 8000.this is Hard limit. still fork bombing attack killed the box and machine needed reboot. will any body please tell me why this is so? i have tried all this

Re: Fork bombing Attack

2007-05-17 Thread Alan Cox
On Thu, 17 May 2007 12:55:53 +0530 "Anand Jahagirdar" <[EMAIL PROTECTED]> wrote: > Dear Sir, > I just want to know whether fork bombing attack still > exist on the machine having Distribution as Fedora Core 6 and Linux > Kernel 2.6.x.? > >

Re: Fork bombing Attack

2007-05-17 Thread Marat Buharov
May be because Mars was in Scorpio? On 5/17/07, Anand Jahagirdar <[EMAIL PROTECTED]> wrote: Dear Sir, I just want to know whether fork bombing attack still exist on the machine having Distribution as Fedora Core 6 and Linux Kernel 2.6.x.? additional Info : I ha

Fork bombing Attack

2007-05-17 Thread Anand Jahagirdar
Dear Sir, I just want to know whether fork bombing attack still exist on the machine having Distribution as Fedora Core 6 and Linux Kernel 2.6.x.? additional Info : I have set ulimit as 8000 and loged in as Guest User on machine having Distribution as Fedora Core 6 and