TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: Good ideas to defend against the bash RCE?

3 点作者 bsaunder超过 10 年前
Hoping to create a discussion here on ideas on how to defend against the current bash RCE. Probably just a subset of existing "best practices" that are particularly relevant for the current attack vector for the bash RCE. Recommend keeping posts to one recommendation per post so that the best can filter up/down individually rather than as a set.

5 条评论

tptacek超过 10 年前
Suggestions to lock down applications to least privileges and to set up monitoring on servers are a good idea, but they're not going to help that much here. You should operate under the assumption that an attacker who gets any code exec on your machine under any uid is going to have root, usually milliseconds later.
bsaunder超过 10 年前
Run externally accessible applications under a user id with no login and no ownership of the application files it's running. Make sure that the euid of the process can only write to the specific areas of the system that are absolutely necessary. This would help quarantine the system impact of remote code execution like this.
bsaunder超过 10 年前
Block outbound request from publicly accessible servers (or white list them if necessary).<p>This would make it harder for attackers to fetch&#x2F;install more tools.
wglb超过 10 年前
1. Patch or otherwise fix Bash.<p>2. Understand the chain of how environment variable values might flow through your web stack. Eliminate them.
bsaunder超过 10 年前
Make sure tripwire is installed&#x2F;configured&#x2F;monitored.<p>Watch for unexpected changes to public servers.