База на знаења

Shell Fork Bomb Protection  Испечати

Overview:

Fork bombs start a cascade of small processes on a server that duplicate themselves until the server’s resources are depleted.

This feature helps you protect your server from users with terminal access (SSH or Telnet) who may inadvertently or intentionally cause a fork bomb.

How to configure shell fork bomb protection

To enable or disable shell fork bomb protection, click Enable Protection or Disable Protection.

After you enable shell fork bomb protection, the system imposes the following limits on users in order to protect the server:

Limit Option Description
200000 -c Limits the maximum size of core files that users can create.
200000 -d Limits the maximum size of a process’s data segment.
200000 -m Limits the maximum resident set size.
100 -n Limits the maximum number of open-file descriptors.
8192 -s Limits the maximum stack size.
35 -u Limits the maximum number of processes that are available to a single user.
Note:
This option limits cPanel users with bash shell access, which is the default shell for cPanel users, to 35 processes each.
Unlimited -v The amount of virtual memory available for the processes.

Дали Ви помогна овој одговор?

Понудени резултати

Apache mod_userdir Tweak
Overview: This interface allows you to disable the Apache mod_userdir module’s functionality for...
Compiler Access
Overview: This interface lets you manage your server’s C and C++ compiler user access. This can...
Configure Security Policies
Overview: The Configure Security Policies interface allows you to configure your security policy...
cPHulk Brute Force Protection
Overview: This interface allows you to configure cPHulk, a service that provides protection for...
Host Access Control
Overview: Warning: For users of CentOS 7, CloudLinux™ 7, and Red Hat® Enterprise Linux® 7 and...