Re: Patch Related with Fork Bombing Attack

2007-07-15 Thread Simon Arlott
On 13/07/07 13:39, Anand Jahagirdar wrote: > This patch Warns the administrator about the fork bombing attack > (whenever any user is crossing its process limit). I have used > +printk(KERN_WARNING "User with uid %u is > crossing the process limi

Re: Patch Related with Fork Bombing Attack

2007-07-15 Thread Simon Arlott
On 13/07/07 13:39, Anand Jahagirdar wrote: This patch Warns the administrator about the fork bombing attack (whenever any user is crossing its process limit). I have used +printk(KERN_WARNING User with uid %u is crossing the process limit\n,p-user-uid); I

Re: Patch Related with Fork Bombing Attack

2007-07-14 Thread WANG Cong
On Fri, Jul 13, 2007 at 06:09:02PM +0530, Anand Jahagirdar wrote: >Hello All {snip} >Index: root/Desktop/a1/linux-2.6.17.tar.bz2_FILES/linux-2.6.17/kernel/fork.c >=== >---

Re: Patch Related with Fork Bombing Attack

2007-07-14 Thread WANG Cong
On Fri, Jul 13, 2007 at 06:09:02PM +0530, Anand Jahagirdar wrote: Hello All {snip} Index: root/Desktop/a1/linux-2.6.17.tar.bz2_FILES/linux-2.6.17/kernel/fork.c === ---

Patch Related with Fork Bombing Attack

2007-07-13 Thread Anand Jahagirdar
: This patch Warns the administrator about the fork bombing attack (whenever any user is crossing its process limit). I have used printk_ratelimit function in this patch. This function helps to prevent flooding of syslog and prints message as per the values set by root user in following files:- 1) /proc

Patch Related with Fork Bombing Attack

2007-07-13 Thread Anand Jahagirdar
: This patch Warns the administrator about the fork bombing attack (whenever any user is crossing its process limit). I have used printk_ratelimit function in this patch. This function helps to prevent flooding of syslog and prints message as per the values set by root user in following files:- 1) /proc

Re: Patch Related With Fork Bombing Attack

2007-06-27 Thread Bodo Eggert
(not CCing security, since it's not a security bug and it's too late to verify if they should be on cc. Will do later.) Anand Jahagirdar <[EMAIL PROTECTED]> wrote: > This patch Warns the administrator about the fork bombing attack > (whenever any user is crossing its process limit).

Re: Patch Related With Fork Bombing Attack

2007-06-27 Thread Bodo Eggert
(not CCing security, since it's not a security bug and it's too late to verify if they should be on cc. Will do later.) Anand Jahagirdar [EMAIL PROTECTED] wrote: This patch Warns the administrator about the fork bombing attack (whenever any user is crossing its process limit). I have used

Patch Related With Fork Bombing Attack

2007-06-26 Thread Anand Jahagirdar
Hello All As per the discussion in the thread with subject as Patch Related with Fork Bombing Attack on LKML,I have modified my patch. I request you for the inclusion of my attached patch named "fork.patch". Summery of the Patch: This patch Warns the administrator abou

Patch Related With Fork Bombing Attack

2007-06-26 Thread Anand Jahagirdar
Hello All As per the discussion in the thread with subject as Patch Related with Fork Bombing Attack on LKML,I have modified my patch. I request you for the inclusion of my attached patch named fork.patch. Summery of the Patch: This patch Warns the administrator about the fork

Re: Fork Bombing Attack

2007-05-22 Thread Mark Lord
Anand Jahagirdar wrote: Hello All I tried to execute a program which creates 8152 process.( i=0; while( i<14) i++ fork(); ) with ulimit 8200. This program created 8152 processes and then stopped and came back to command prompt. this proves that my machine do have sufficient resources

Re: Fork Bombing Attack

2007-05-22 Thread Mark Lord
Anand Jahagirdar wrote: Hello All I tried to execute a program which creates 8152 process.( i=0; while( i14) i++ fork(); ) with ulimit 8200. This program created 8152 processes and then stopped and came back to command prompt. this proves that my machine do have sufficient resources

Re: Fork Bombing Attack

2007-05-18 Thread Bernd Eckenfels
In article <[EMAIL PROTECTED]> you wrote: > I found one more interesting thing related with fork > bombing attack. i have set following in /etc/security/limits.conf file > > [EMAIL PROTECTED]hard nproc 3000 > [EMAIL PROTECTED] hard nproc 500 The # i

Re: Fork Bombing Attack

2007-05-18 Thread Krzysztof Halasa
> output is 8050. when root or any other user changes ulimit by typing > "ulimit -u value",.ulimit value is changed for that session and not > permantely. actually ulimit should help to prevent fork bombing attack > but it wont and fork bombing attack still take down th

Re: Fork Bombing Attack

2007-05-18 Thread Valdis . Kletnieks
s children. Or more correctly, those children that don't themselves change the value again - the distinction is crucial in this case. > actually ulimit should help to prevent fork bombing attack Right. It *helps* prevent it. But it isn't by itself a total cure. > but it wont and

Re: Fork Bombing Attack

2007-05-18 Thread Anand Jahagirdar
Hello All I found one more interesting thing related with fork bombing attack. i have set following in /etc/security/limits.conf file [EMAIL PROTECTED]hard nproc 3000 [EMAIL PROTECTED] hard nproc 500 I have tried to execute fork bombing program on the same machine

Re: Fork Bombing Attack

2007-05-18 Thread Ahmed S. Darwish
terminal with guest account and this fork bombing attack killed the box completely and machine needed reboot. I think if you want resource limiting per _UID_ (and not per _process_ as you did), you should use PAM module pam_limits.so. You can edit those limits using the file /etc/security/l

Re: Fork Bombing Attack

2007-05-18 Thread Michael Tokarev
> on another terminal with guest account and this fork bombing attack > killed the box completely and machine needed reboot. Do you know ulimits are a *process* property, not uid property? That is, if, in some process of a giving user, you set ulimit value, it does NOT affect other processes of

Re: Fork Bombing Attack

2007-05-18 Thread Anand Jahagirdar
ould not able to fork another single process when it reaches to 100 processes count. actual result :- kernel allow me to create another processes without giving error. due to this i tried to execute same fork bombing program on another terminal with guest account and this fork bombing attack k

Re: Fork Bombing Attack

2007-05-18 Thread Anand Jahagirdar
another single process when it reaches to 100 processes count. actual result :- kernel allow me to create another processes without giving error. due to this i tried to execute same fork bombing program on another terminal with guest account and this fork bombing attack killed the box completely

Re: Fork Bombing Attack

2007-05-18 Thread Michael Tokarev
bombing attack killed the box completely and machine needed reboot. Do you know ulimits are a *process* property, not uid property? That is, if, in some process of a giving user, you set ulimit value, it does NOT affect other processes of the same user already running at the same time, but only new

Re: Fork Bombing Attack

2007-05-18 Thread Ahmed S. Darwish
and this fork bombing attack killed the box completely and machine needed reboot. I think if you want resource limiting per _UID_ (and not per _process_ as you did), you should use PAM module pam_limits.so. You can edit those limits using the file /etc/security/limits.conf Regards, -- Ahmed S

Re: Fork Bombing Attack

2007-05-18 Thread Anand Jahagirdar
Hello All I found one more interesting thing related with fork bombing attack. i have set following in /etc/security/limits.conf file [EMAIL PROTECTED]hard nproc 3000 [EMAIL PROTECTED] hard nproc 500 I have tried to execute fork bombing program on the same machine

Re: Fork Bombing Attack

2007-05-18 Thread Valdis . Kletnieks
, those children that don't themselves change the value again - the distinction is crucial in this case. actually ulimit should help to prevent fork bombing attack Right. It *helps* prevent it. But it isn't by itself a total cure. but it wont and fork bombing attack still take down

Re: Fork Bombing Attack

2007-05-18 Thread Krzysztof Halasa
changes ulimit by typing ulimit -u value,.ulimit value is changed for that session and not permantely. actually ulimit should help to prevent fork bombing attack but it wont and fork bombing attack still take down the machine having latest linux distributions. how about: $ ulimit -u 100

Re: Fork Bombing Attack

2007-05-18 Thread Bernd Eckenfels
In article [EMAIL PROTECTED] you wrote: I found one more interesting thing related with fork bombing attack. i have set following in /etc/security/limits.conf file [EMAIL PROTECTED]hard nproc 3000 [EMAIL PROTECTED] hard nproc 500 The # is a comment character. So

Re: Fork Bombing Attack

2007-05-17 Thread Valdis . Kletnieks
On Thu, 17 May 2007 20:15:32 +0530, Anand Jahagirdar said: > Hello All > I have set per user process limit ( ulimit) for both > root and guest account as 8000 by using option ulimit -u 8000.this is > Hard limit. still fork bombing attack killed the box and machine >

Fork Bombing Attack

2007-05-17 Thread Anand Jahagirdar
Hello All I have set per user process limit ( ulimit) for both root and guest account as 8000 by using option ulimit -u 8000.this is Hard limit. still fork bombing attack killed the box and machine needed reboot. will any body please tell me why this is so? i have tried all

Re: Fork bombing Attack

2007-05-17 Thread Alan Cox
On Thu, 17 May 2007 12:55:53 +0530 "Anand Jahagirdar" <[EMAIL PROTECTED]> wrote: > Dear Sir, > I just want to know whether fork bombing attack still > exist on the machine having Distribution as Fedora Core 6 and Linux > Kernel 2.6.x.? > >

Re: Fork bombing Attack

2007-05-17 Thread Marat Buharov
May be because Mars was in Scorpio? On 5/17/07, Anand Jahagirdar <[EMAIL PROTECTED]> wrote: Dear Sir, I just want to know whether fork bombing attack still exist on the machine having Distribution as Fedora Core 6 and Linux Kernel 2.6.x.? additional Info : I ha

Fork bombing Attack

2007-05-17 Thread Anand Jahagirdar
Dear Sir, I just want to know whether fork bombing attack still exist on the machine having Distribution as Fedora Core 6 and Linux Kernel 2.6.x.? additional Info : I have set ulimit as 8000 and loged in as Guest User on machine having Distribution as Fedora Core 6

Fork bombing Attack

2007-05-17 Thread Anand Jahagirdar
Dear Sir, I just want to know whether fork bombing attack still exist on the machine having Distribution as Fedora Core 6 and Linux Kernel 2.6.x.? additional Info : I have set ulimit as 8000 and loged in as Guest User on machine having Distribution as Fedora Core 6

Re: Fork bombing Attack

2007-05-17 Thread Marat Buharov
May be because Mars was in Scorpio? On 5/17/07, Anand Jahagirdar [EMAIL PROTECTED] wrote: Dear Sir, I just want to know whether fork bombing attack still exist on the machine having Distribution as Fedora Core 6 and Linux Kernel 2.6.x.? additional Info : I have set

Re: Fork bombing Attack

2007-05-17 Thread Alan Cox
On Thu, 17 May 2007 12:55:53 +0530 Anand Jahagirdar [EMAIL PROTECTED] wrote: Dear Sir, I just want to know whether fork bombing attack still exist on the machine having Distribution as Fedora Core 6 and Linux Kernel 2.6.x.? additional Info : I have set ulimit

Fork Bombing Attack

2007-05-17 Thread Anand Jahagirdar
Hello All I have set per user process limit ( ulimit) for both root and guest account as 8000 by using option ulimit -u 8000.this is Hard limit. still fork bombing attack killed the box and machine needed reboot. will any body please tell me why this is so? i have tried all

Re: Fork Bombing Attack

2007-05-17 Thread Valdis . Kletnieks
On Thu, 17 May 2007 20:15:32 +0530, Anand Jahagirdar said: Hello All I have set per user process limit ( ulimit) for both root and guest account as 8000 by using option ulimit -u 8000.this is Hard limit. still fork bombing attack killed the box and machine needed reboot