From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753043AbdJLCzX (ORCPT ); Wed, 11 Oct 2017 22:55:23 -0400 Received: from out1-smtp.messagingengine.com ([66.111.4.25]:44111 "EHLO out1-smtp.messagingengine.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751757AbdJLCzV (ORCPT ); Wed, 11 Oct 2017 22:55:21 -0400 X-ME-Sender: Date: Thu, 12 Oct 2017 13:55:18 +1100 From: "Tobin C. Harding" To: "Theodore Ts'o" , kernel-hardening@lists.openwall.com, linux-kernel@vger.kernel.org, Linus Torvalds , Kees Cook , Paolo Bonzini , Tycho Andersen , "Roberts, William C" , Tejun Heo , Jordan Glover , Greg KH , Petr Mladek , Joe Perches , Ian Campbell , Sergey Senozhatsky , Catalin Marinas , Will Deacon , Steven Rostedt , Chris Fries , Dave Weinstein , Daniel Micay , Djalal Harouni Subject: Re: [kernel-hardening] [PATCH] printk: hash addresses printed with %p Message-ID: <20171012025518.GD30753@eros> References: <1507693696-3777-1-git-send-email-me@tobin.cc> <20171011174858.bga4okxq5plxzxze@thunk.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20171011174858.bga4okxq5plxzxze@thunk.org> X-Mailer: Mutt 1.5.24 (2015-08-30) User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Removing kvm@vger.kernel.org from the CC list. On Wed, Oct 11, 2017 at 01:48:58PM -0400, Theodore Ts'o wrote: > On Wed, Oct 11, 2017 at 02:48:16PM +1100, Tobin C. Harding wrote: > > +/* > > + * Obfuscates pointer (algorithm taken from kptr_obfuscate(). See kernel/kcmp.c) > > + * v is the pointer value, randval is some random value, oddval is some random > > + * odd value. > > + * > > + * The obfuscation is done in two steps. First we xor the kernel pointer with > > + * a random value, which puts pointer into a new position in a reordered space. > > + * Secondly we multiply the xor production with a large odd random number to > > + * permute its bits even more (the odd multiplier guarantees that the product > > + * is unique ever after the high bits are truncated, since any odd number is > > + * relative prime to 2^n). > > + */ > > Why not just expose kptr_obfusecate() and use it, instead of copying > code? > > Also, I'm nervous about the obfuscation. If the attacker can get a > handful of known "real kernel pointer" and "obfuscated kernel pointer" > values, it wouldn't be that hard for them to be able to reverse > engineer the two secret values. > > Perhaps the argument is "if the attacker can get a _single_ real > kernel address, it's all over anyway", which is probably true for > KASLR, but which might not be true for all attacks. > > Anyway, if you use kptr_obfuscate in kernel/kcmp.c, then if we later > decide that we should change the obfuscation algorithm to something > stronger, we only need to do it in one place. > > - Ted Thanks Ted, others have misgivings about this method also. The email threads are all a bit mixed up (thansk to my ineptness at posting patches :). FYI, in the other threads Jason A. Donenfel and Linus Torvalds have discussed SipHash as a solution. thanks, Tobin.