linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* Re: PTY DOS vulnerability?
@ 2003-07-08 23:11 Clayton Weaver
  2003-07-09 10:08 ` Svein Ove Aas
  0 siblings, 1 reply; 14+ messages in thread
From: Clayton Weaver @ 2003-07-08 23:11 UTC (permalink / raw)
  To: linux-kernel

Seems to me that a pty ulimit and making
sure that root can always access an unused
pty on demand are separate issues.

The ulimit is the same issue that it is for
open files, disk quota, aggregate per-user
memory utilization, etc, maintaining the
"multi-user" aspect of system usability.

Making sure that root has the tools to do
what is needed in a pty resource exhaustion
situation deserves perhaps a different
mechanism, like dynamic, on-demand pty device
creation for root (which seems to me more
robust than a "reserved for root" mechanism,
which allows the possibility that root
processes have already used up that many
ptys when root needs one in an emergency).

Regards,

Clayton Weaver
<mailto: cgweav@email.com>

PS: Linux Golf Howto addenda

Long grass: when hitting out of long grass,
the grass tends to wrap around the heel of the club, where the club face meets the club shaft,
without offering comparable resistance to the
toe of the club face. This tends to close the
club face and deliver it to the ball at not
quite the intended angle. Solution: tilt the
toe of the club away from the ball a few
degrees before gripping the club. Soft,
well-watered green grass a few inches long
needs less opening of the club face than
foot long dry grass (more fiber in stems
than leaves) to accomplish the necessary
adjustment.

-- 
__________________________________________________________
Sign-up for your own FREE Personalized E-mail at Mail.com
http://www.mail.com/?sr=signup

CareerBuilder.com has over 400,000 jobs. Be smarter about your job search
http://corp.mail.com/careers


^ permalink raw reply	[flat|nested] 14+ messages in thread
* PTY DOS vulnerability?
@ 2003-06-30 14:18 Fredrik Tolf
  2003-06-30 17:55 ` Alan Cox
                   ` (2 more replies)
  0 siblings, 3 replies; 14+ messages in thread
From: Fredrik Tolf @ 2003-06-30 14:18 UTC (permalink / raw)
  To: linux-kernel

Has someone considered PTYs as a possible attack vector for DOS 
attacks? Correct me if I'm wrong, but cannot someone just open 
all available PTYs on a console-less server and make everyone 
unable to log in?

I mean, what if eg. apache is hacked, and the first thing the 
attacker does is to tie up all PTYs, so that noone can log in to 
correct the situation while the attacker can go about his 
business? Then the only possible solution would be to reboot the 
server, which might very well not be desirable.

If you want proof of concept code, look at
http://www.dolda2000.cjb.net/~fredrik/ptmx.c
I successfully ran this on one of my servers which effectively 
disabled anyone from logging in via SSH.

Shouldn't PTYs be a per-user resource limit?

Someone must have thought of this before me, right? How am I 
wrong?

Fredrik Tolf


^ permalink raw reply	[flat|nested] 14+ messages in thread

end of thread, other threads:[~2003-07-09  9:53 UTC | newest]

Thread overview: 14+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2003-07-08 23:11 PTY DOS vulnerability? Clayton Weaver
2003-07-09 10:08 ` Svein Ove Aas
  -- strict thread matches above, loose matches on Subject: below --
2003-06-30 14:18 Fredrik Tolf
2003-06-30 17:55 ` Alan Cox
2003-06-30 21:31   ` Fredrik Tolf
2003-06-30 21:36     ` Alan Cox
2003-07-01 12:15       ` Jesse Pollard
2003-07-01 13:41       ` Timothy Miller
2003-07-01  6:22 ` Oleg Drokin
2003-07-01 11:57 ` Jesse Pollard
2003-07-01 19:53   ` Helge Hafting
2003-07-02  6:42     ` Paul Rolland
2003-07-03  1:14     ` Jesse Pollard
2003-07-03  1:52       ` H. Peter Anvin

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).