From owner-freebsd-security@freebsd.org Wed Oct 26 13:49:39 2016 Return-Path: Delivered-To: freebsd-security@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 7CEF9C222CA for ; Wed, 26 Oct 2016 13:49:39 +0000 (UTC) (envelope-from des@des.no) Received: from smtp.des.no (smtp.des.no [194.63.250.102]) by mx1.freebsd.org (Postfix) with ESMTP id 411FDBE5; Wed, 26 Oct 2016 13:49:38 +0000 (UTC) (envelope-from des@des.no) Received: from desk.des.no (smtp.des.no [194.63.250.102]) by smtp.des.no (Postfix) with ESMTP id B202710BB1; Wed, 26 Oct 2016 13:49:37 +0000 (UTC) Received: by desk.des.no (Postfix, from userid 1001) id 9355143154; Wed, 26 Oct 2016 15:49:37 +0200 (CEST) From: =?utf-8?Q?Dag-Erling_Sm=C3=B8rgrav?= To: CeDeROM Cc: "Robert N. M. Watson" , freebsd-security@freebsd.org, Pawel Jakub Dawidek Subject: Re: FreeBSD Security Advisory FreeBSD-SA-16:15.sysarch [REVISED] References: <20161025173641.BCDFD1911@freefall.freebsd.org> <20161026042748.GG60006@garage.freebsd.pl> <20161026061504.GH60006@garage.freebsd.pl> <0717BEFA-4E65-4990-AC50-FD80681C110C@FreeBSD.org> <868ttbwio9.fsf@desk.des.no> <864m3zwdro.fsf@desk.des.no> <86wpgvuwq2.fsf@desk.des.no> <86shrjuud4.fsf@desk.des.no> Date: Wed, 26 Oct 2016 15:49:37 +0200 In-Reply-To: (cederom@tlen.pl's message of "Wed, 26 Oct 2016 15:33:31 +0200") Message-ID: <86oa27usni.fsf@desk.des.no> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/25.1 (berkeley-unix) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 26 Oct 2016 13:49:39 -0000 CeDeROM writes: > You have this idea to remove local denial of service advisories. No. With very few (imho unfortunate) exceptions, we have *never* issued advisories for local DoS exploits. So we're not taking anything away from you. > My idea is to move them into benchmarks/recommendations such as CIS, The CIS benchmarks are not lists of vulnerabilities. They are lists of best practices for configuring a machine, and shell scripts that tell you whether a machine is configured correctly according to the benchmark. The only way to prevent local denial of service attacks is to not have any users. A four-byte shell script will send the load through the roof. A seven- or ten-byte script will render the machine unusable, and you won't even be able to log in to kill it. These are not bugs, they're fundamental features of the operating system, and you can't plug them without making the system useless for its intended purpose. DES --=20 Dag-Erling Sm=C3=B8rgrav - des@des.no