From mboxrd@z Thu Jan 1 00:00:00 1970 From: Pavel Machek Subject: Re: [PATCH] [RFC] Deter exploit bruteforcing Date: Fri, 2 Jan 2015 23:46:46 +0100 Message-ID: <20150102224646.GB29018@amd> References: <1419457167-15042-1-git-send-email-richard@nod.at> <20150102051142.GF4873@amd> <54A67A38.3000207@nod.at> <20150102194616.GA27538@amd> <54A7103E.6020500@nod.at> <20150102222936.GA29018@amd> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: Richard Weinberger , Kees Cook , LKML , "linux-fsdevel@vger.kernel.org" , David Rientjes , Aaron Tomlin , DaeSeok Youn , Thomas Gleixner , vdavydov@parallels.com, Rik van Riel , Oleg Nesterov , Andrew Morton , Peter Zijlstra , Ingo Molnar , Al Viro , Andy Lutomirski , Brad Spengler To: Jiri Kosina Return-path: Received: from atrey.karlin.mff.cuni.cz ([195.113.26.193]:54024 "EHLO atrey.karlin.mff.cuni.cz" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752207AbbABWqs (ORCPT ); Fri, 2 Jan 2015 17:46:48 -0500 Content-Disposition: inline In-Reply-To: Sender: linux-fsdevel-owner@vger.kernel.org List-ID: On Fri 2015-01-02 23:32:35, Jiri Kosina wrote: > On Fri, 2 Jan 2015, Pavel Machek wrote: > > > > > Can the slowdown be impelmented in glibc, then? > > > > > > glibc has a lot of asserts where it can detect stack smashing and kills the > > > current process using abort(). Here it could of course also call > > > sleep(). > > > > Please do it in glibc, then. > > You also want to protect against binaries that are evil on purpose, > right? Umm. No. Not by default. We don't want to break crashme or trinity by default. We want to delay people trying to bruteforce glibc canaries. We want to do it by default. Pavel -- (english) http://www.livejournal.com/~pavelmachek (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blog.html