Consider setting more restrictive default resource limits
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
pam (Ubuntu) |
Fix Released
|
Wishlist
|
Kees Cook |
Bug Description
/etc/security/
* hard nproc 2048
Then log out/in (or reboot, or something) and try:
root@ubuntu# :(){ :|:;}:
viola? :)
Bug #14166 was suggested after seeing Bastille's horrid UI and also ties in with
Hardened Ubuntu ( https:/
would probably include resource controls to limit this more robustly; though my
mock-up just has a system-wide limit. Anyway, this would be a good default for
that particular setting, as it seems effective and 2048 is pretty excessive
unless you're a server.
Not that n00bs are better off not getting pwned once in a while; that's how I
learned . . . but definitely if you have a multi-user box (server) this kind of
limit is needed on normal users who have a log-in shell. Don't want local users
killing your whole box.
I made this a p1 priority because it takes about 4 seconds to do (not including
repackaging, sorry) and it's a "security enhancement" (or rather, slashdot has
brought this into everyone's view and normal desktop users think it affects them
*eyesroll* though yes for a server it is). In other words, Ubuntu gets a nice
pat on the back and a quick PR boost.
Related branches
CVE References
Changed in pam: | |
assignee: | pitti → keescook |
Changed in pam: | |
status: | Confirmed → Triaged |
(In reply to comment #0) limits. conf:
> /etc/security/
> * hard nproc 2048
This would prevent the easiest class of forkbombs from DoS'ing the computer, but
alone this really achieves not much more. In addition you need to limit the
number of logins, the memory, cpu time, etc. to provide a halfway effective DoS
protection.
Especially the maximum amount of allowed memory should be restricted dynamically
and depending on the size of available RAM; limits.conf does not offer this
functionality unfortunately.