- Stop plugging these 7 devices into extension cords - even if they sound like a good idea
- I changed these 6 Samsung TV settings to give the picture quality an instant boost
- I tested a 9,000,000mAh battery pack from eBay that cost $10 - here's my verdict
- The 3 most Windows-like Linux distros to try because change is hard
- This 'unlimited battery' GPS tracker is an integral part of my hikes - and it's on sale
How to prevent fork bombs on your Linux development servers
Learn how to protect your Linux server from the fork bomb denial-of-service attack with this video tutorial by Jack Wallen.
Even though the Linux platform you develop on is considered very secure, it doesn’t mean it’s 100% guaranteed to be safe. Case in point: the fork bomb.
A fork bomb is a form of denial-of-service attack that uses the fork operation, which is executed recursively and can consume all system resources. The only way to regain control of a fork-bombed system is a reboot, and there’s no guarantee it won’t return.
SEE: Hiring Kit: Network Engineer (TechRepublic Premium)
So, how do you prevent this from happening? You lower the number of processes allowed on your Linux server.
By default, Linux allows 128,038 processes. In order to protect your server from a fork bomb, you must lower that number. It’s actually really simple to do, but you can’t lower the number too much, otherwise you might find your system unusable.
So, how do you lower the number of allowed processes? Let me show you.
First, let’s check to see how many processes are allowed on your system by running the command ulimit -u
. If you see 128,038, your system could be vulnerable to a fork bomb.
Let’s lower that number to 5,000 with the command ulimit -S -u 5000
. If you issue the command ulimit -u
it should now show only 5,000 processes available.
However, to be safe, you want to limit processes by user. To do that, open the limits.conf file with the command sudo nano /etc/security/limits.conf
, and then, add a line at the bottom of the file that looks something like jack hard nproc 5000
. That would limit the user jack to a maximum of 5,000 processes.
Make this change for whatever user you need; just use caution when doing so with system users, as you don’t want to wind up with a system that won’t run properly.
After doing this, reboot your system, and you’re good to go. Congratulations, you’ve just protected your Linux development system from fork bombs.
Subscribe to TechRepublic’s How To Make Tech Work on YouTube for all the latest tech advice for business pros from Jack Wallen.