Announcement

Collapse
No announcement yet.

Fork Brute Force Attack Detection/Mitigation Still Being Worked On For The Linux Kernel

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Fork Brute Force Attack Detection/Mitigation Still Being Worked On For The Linux Kernel

    Phoronix: Fork Brute Force Attack Detection/Mitigation Still Being Worked On For The Linux Kernel

    A security module continues to be worked on for being able to detect and mitigate against fork/execute brute force attacks to Linux systems...

    Phoronix, Linux Hardware Reviews, Linux hardware benchmarks, Linux server benchmarks, Linux benchmarking, Desktop Linux, Linux performance, Open Source graphics, Linux How To, Ubuntu benchmarks, Ubuntu hardware, Phoronix Test Suite

  • #2
    I thought this was solved (many) years ago with ulimit? I remember testing fork bombs, and while they kept running, they were limited to a maximum number of processes that the system could deal with.

    Comment


    • #3
      Originally posted by macemoneta View Post
      I thought this was solved (many) years ago with ulimit? I remember testing fork bombs, and while they kept running, they were limited to a maximum number of processes that the system could deal with.
      ulimit only limits the number of descendant processes that run in parallel. The attacks mentioned in the article do not require a large number of parallel processes, as they can wait for the previous copy being killed before trying again.

      That said, I don't really see what these attacks give you that you can't do by catching SIGSEGV.

      Comment


      • #4
        I kinda wish it was called a "brute forks" attack...

        Comment

        Working...
        X