From mboxrd@z Thu Jan 1 00:00:00 1970 From: Pavel Machek Subject: Re: [PATCH] [RFC] Deter exploit bruteforcing Date: Fri, 2 Jan 2015 23:54:20 +0100 Message-ID: <20150102225420.GC29018@amd> References: <1419457167-15042-1-git-send-email-richard@nod.at> <20150102051142.GF4873@amd> <54A67A38.3000207@nod.at> <20150102194616.GA27538@amd> <54A7103E.6020500@nod.at> <20150102222936.GA29018@amd> <20150102224646.GB29018@amd> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: Richard Weinberger , Kees Cook , LKML , "linux-fsdevel@vger.kernel.org" , David Rientjes , Aaron Tomlin , DaeSeok Youn , Thomas Gleixner , vdavydov@parallels.com, Rik van Riel , Oleg Nesterov , Andrew Morton , Peter Zijlstra , Ingo Molnar , Al Viro , Andy Lutomirski , Brad Spengler To: Jiri Kosina Return-path: Content-Disposition: inline In-Reply-To: Sender: linux-kernel-owner@vger.kernel.org List-Id: linux-fsdevel.vger.kernel.org On Fri 2015-01-02 23:49:52, Jiri Kosina wrote: > On Fri, 2 Jan 2015, Pavel Machek wrote: > > > > You also want to protect against binaries that are evil on purpose, > > > right? > > > > Umm. No. Not by default. We don't want to break crashme or trinity by > > default. > > I thought trinity is issuing syscalls directly (would make more sense than > going through glibc, wouldn't it?) ... haven't checked the source though. Patch in this thread wanted to insert delays into kernel on SIGSEGV processing. That's bad idea by default. But changing glibc to do sleep(30); abort(); instead of abort(); to slow down bruteforcing of canaries makes some kind of sense... and should be ok by default. Pavel -- (english) http://www.livejournal.com/~pavelmachek (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blog.html