Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-05 Thread Kees Cook
On Sat, Jan 3, 2015 at 3:19 PM, Richard Weinberger wrote: > Am 04.01.2015 um 00:06 schrieb Andy Lutomirski: >> As an attempt to help end this particular line of debate: putting the >> sleep in glibc won't work. The point isn't to make the crashed >> process crash more slowly; it's to limit the

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-05 Thread Kees Cook
On Sat, Jan 3, 2015 at 3:19 PM, Richard Weinberger rich...@nod.at wrote: Am 04.01.2015 um 00:06 schrieb Andy Lutomirski: As an attempt to help end this particular line of debate: putting the sleep in glibc won't work. The point isn't to make the crashed process crash more slowly; it's to

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-03 Thread Richard Weinberger
Am 04.01.2015 um 00:06 schrieb Andy Lutomirski: > As an attempt to help end this particular line of debate: putting the > sleep in glibc won't work. The point isn't to make the crashed > process crash more slowly; it's to limit the rate at which *new* > siblings can be forked and crashed as a

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-03 Thread Richard Weinberger
Am 04.01.2015 um 00:01 schrieb Pavel Machek: > On Sat 2015-01-03 23:44:18, Richard Weinberger wrote: >> Am 03.01.2015 um 23:36 schrieb Pavel Machek: >>> >> No. This is not what this patch does. >> >>> But changing glibc to do sleep(30); abort(); instead of abort(); to >>> slow down

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-03 Thread Andy Lutomirski
On Sat, Jan 3, 2015 at 2:36 PM, Pavel Machek wrote: > >> >> No. This is not what this patch does. >> >> >> >>> But changing glibc to do sleep(30); abort(); instead of abort(); to >> >>> slow down bruteforcing of canaries makes some kind of sense... and >> >>> should be ok by default. >> >> >> >>

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-03 Thread Pavel Machek
On Sat 2015-01-03 23:44:18, Richard Weinberger wrote: > Am 03.01.2015 um 23:36 schrieb Pavel Machek: > > > No. This is not what this patch does. > > > But changing glibc to do sleep(30); abort(); instead of abort(); to > > slow down bruteforcing of canaries makes some kind of

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-03 Thread Richard Weinberger
Am 03.01.2015 um 23:36 schrieb Pavel Machek: > No. This is not what this patch does. > But changing glibc to do sleep(30); abort(); instead of abort(); to > slow down bruteforcing of canaries makes some kind of sense... and > should be ok by default. As I saidn

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-03 Thread Pavel Machek
> >> No. This is not what this patch does. > >> > >>> But changing glibc to do sleep(30); abort(); instead of abort(); to > >>> slow down bruteforcing of canaries makes some kind of sense... and > >>> should be ok by default. > >> > >> As I saidn only focusing one the specific stack canary case

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-03 Thread Richard Weinberger
Am 03.01.2015 um 00:08 schrieb Pavel Machek: > On Sat 2015-01-03 00:00:22, Richard Weinberger wrote: >> Am 02.01.2015 um 23:54 schrieb Pavel Machek: >>> On Fri 2015-01-02 23:49:52, Jiri Kosina wrote: On Fri, 2 Jan 2015, Pavel Machek wrote: >> You also want to protect against binaries

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-03 Thread Richard Weinberger
Am 03.01.2015 um 00:08 schrieb Pavel Machek: On Sat 2015-01-03 00:00:22, Richard Weinberger wrote: Am 02.01.2015 um 23:54 schrieb Pavel Machek: On Fri 2015-01-02 23:49:52, Jiri Kosina wrote: On Fri, 2 Jan 2015, Pavel Machek wrote: You also want to protect against binaries that are evil on

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-03 Thread Pavel Machek
No. This is not what this patch does. But changing glibc to do sleep(30); abort(); instead of abort(); to slow down bruteforcing of canaries makes some kind of sense... and should be ok by default. As I saidn only focusing one the specific stack canary case is not enough. Ok,

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-03 Thread Richard Weinberger
Am 04.01.2015 um 00:01 schrieb Pavel Machek: On Sat 2015-01-03 23:44:18, Richard Weinberger wrote: Am 03.01.2015 um 23:36 schrieb Pavel Machek: No. This is not what this patch does. But changing glibc to do sleep(30); abort(); instead of abort(); to slow down bruteforcing of canaries makes

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-03 Thread Pavel Machek
On Sat 2015-01-03 23:44:18, Richard Weinberger wrote: Am 03.01.2015 um 23:36 schrieb Pavel Machek: No. This is not what this patch does. But changing glibc to do sleep(30); abort(); instead of abort(); to slow down bruteforcing of canaries makes some kind of sense... and should be ok

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-03 Thread Andy Lutomirski
On Sat, Jan 3, 2015 at 2:36 PM, Pavel Machek pa...@ucw.cz wrote: No. This is not what this patch does. But changing glibc to do sleep(30); abort(); instead of abort(); to slow down bruteforcing of canaries makes some kind of sense... and should be ok by default. As I saidn only

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-03 Thread Richard Weinberger
Am 03.01.2015 um 23:36 schrieb Pavel Machek: No. This is not what this patch does. But changing glibc to do sleep(30); abort(); instead of abort(); to slow down bruteforcing of canaries makes some kind of sense... and should be ok by default. As I saidn only focusing one the specific

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-03 Thread Richard Weinberger
Am 04.01.2015 um 00:06 schrieb Andy Lutomirski: As an attempt to help end this particular line of debate: putting the sleep in glibc won't work. The point isn't to make the crashed process crash more slowly; it's to limit the rate at which *new* siblings can be forked and crashed as a canary

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-02 Thread Pavel Machek
On Sat 2015-01-03 00:00:22, Richard Weinberger wrote: > Am 02.01.2015 um 23:54 schrieb Pavel Machek: > > On Fri 2015-01-02 23:49:52, Jiri Kosina wrote: > >> On Fri, 2 Jan 2015, Pavel Machek wrote: > >> > You also want to protect against binaries that are evil on purpose, > right? > >>> >

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-02 Thread Richard Weinberger
Am 02.01.2015 um 23:54 schrieb Pavel Machek: > On Fri 2015-01-02 23:49:52, Jiri Kosina wrote: >> On Fri, 2 Jan 2015, Pavel Machek wrote: >> You also want to protect against binaries that are evil on purpose, right? >>> >>> Umm. No. Not by default. We don't want to break crashme or

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-02 Thread Pavel Machek
On Fri 2015-01-02 23:49:52, Jiri Kosina wrote: > On Fri, 2 Jan 2015, Pavel Machek wrote: > > > > You also want to protect against binaries that are evil on purpose, > > > right? > > > > Umm. No. Not by default. We don't want to break crashme or trinity by > > default. > > I thought trinity is

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-02 Thread Jiri Kosina
On Fri, 2 Jan 2015, Jiri Kosina wrote: > > > You also want to protect against binaries that are evil on purpose, > > > right? > > > > Umm. No. Not by default. We don't want to break crashme or trinity by > > default. > > I thought trinity is issuing syscalls directly (would make more sense than

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-02 Thread Jiri Kosina
On Fri, 2 Jan 2015, Pavel Machek wrote: > > You also want to protect against binaries that are evil on purpose, > > right? > > Umm. No. Not by default. We don't want to break crashme or trinity by > default. I thought trinity is issuing syscalls directly (would make more sense than going

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-02 Thread Pavel Machek
On Fri 2015-01-02 23:32:35, Jiri Kosina wrote: > On Fri, 2 Jan 2015, Pavel Machek wrote: > > > > > Can the slowdown be impelmented in glibc, then? > > > > > > glibc has a lot of asserts where it can detect stack smashing and kills > > > the > > > current process using abort(). Here it could of

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-02 Thread Jiri Kosina
On Fri, 2 Jan 2015, Pavel Machek wrote: > > > Can the slowdown be impelmented in glibc, then? > > > > glibc has a lot of asserts where it can detect stack smashing and kills the > > current process using abort(). Here it could of course also call > > sleep(). > > Please do it in glibc, then.

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-02 Thread Pavel Machek
On Fri 2015-01-02 22:40:14, Richard Weinberger wrote: > Am 02.01.2015 um 20:46 schrieb Pavel Machek: > >>> Does this break trinity, crashme, and similar programs? > >> > >> If they fork() without execve() and a child dies very fast the next fork() > >> will be throttled. > >> This is why I'd like

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-02 Thread Richard Weinberger
Am 02.01.2015 um 20:46 schrieb Pavel Machek: >>> Does this break trinity, crashme, and similar programs? >> >> If they fork() without execve() and a child dies very fast the next fork() >> will be throttled. >> This is why I'd like to make this feature disabled by default. >> >>> Can you detect it

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-02 Thread Pavel Machek
On Fri 2015-01-02 12:00:08, Richard Weinberger wrote: > Am 02.01.2015 um 06:11 schrieb Pavel Machek: > > On Tue 2014-12-30 10:40:15, Kees Cook wrote: > >> On Wed, Dec 24, 2014 at 1:39 PM, Richard Weinberger wrote: > >>> While exploring the offset2lib attack I remembered that > >>> grsecurity has

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-02 Thread Richard Weinberger
Am 02.01.2015 um 06:11 schrieb Pavel Machek: > On Tue 2014-12-30 10:40:15, Kees Cook wrote: >> On Wed, Dec 24, 2014 at 1:39 PM, Richard Weinberger wrote: >>> While exploring the offset2lib attack I remembered that >>> grsecurity has an interesting feature to make such attacks >>> much harder.

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-02 Thread Richard Weinberger
Am 02.01.2015 um 06:11 schrieb Pavel Machek: On Tue 2014-12-30 10:40:15, Kees Cook wrote: On Wed, Dec 24, 2014 at 1:39 PM, Richard Weinberger rich...@nod.at wrote: While exploring the offset2lib attack I remembered that grsecurity has an interesting feature to make such attacks much harder.

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-02 Thread Pavel Machek
On Fri 2015-01-02 12:00:08, Richard Weinberger wrote: Am 02.01.2015 um 06:11 schrieb Pavel Machek: On Tue 2014-12-30 10:40:15, Kees Cook wrote: On Wed, Dec 24, 2014 at 1:39 PM, Richard Weinberger rich...@nod.at wrote: While exploring the offset2lib attack I remembered that grsecurity has

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-02 Thread Pavel Machek
On Fri 2015-01-02 22:40:14, Richard Weinberger wrote: Am 02.01.2015 um 20:46 schrieb Pavel Machek: Does this break trinity, crashme, and similar programs? If they fork() without execve() and a child dies very fast the next fork() will be throttled. This is why I'd like to make this

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-02 Thread Pavel Machek
On Fri 2015-01-02 23:32:35, Jiri Kosina wrote: On Fri, 2 Jan 2015, Pavel Machek wrote: Can the slowdown be impelmented in glibc, then? glibc has a lot of asserts where it can detect stack smashing and kills the current process using abort(). Here it could of course also call

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-02 Thread Jiri Kosina
On Fri, 2 Jan 2015, Pavel Machek wrote: Can the slowdown be impelmented in glibc, then? glibc has a lot of asserts where it can detect stack smashing and kills the current process using abort(). Here it could of course also call sleep(). Please do it in glibc, then. You also want

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-02 Thread Pavel Machek
On Sat 2015-01-03 00:00:22, Richard Weinberger wrote: Am 02.01.2015 um 23:54 schrieb Pavel Machek: On Fri 2015-01-02 23:49:52, Jiri Kosina wrote: On Fri, 2 Jan 2015, Pavel Machek wrote: You also want to protect against binaries that are evil on purpose, right? Umm. No. Not by

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-02 Thread Richard Weinberger
Am 02.01.2015 um 23:54 schrieb Pavel Machek: On Fri 2015-01-02 23:49:52, Jiri Kosina wrote: On Fri, 2 Jan 2015, Pavel Machek wrote: You also want to protect against binaries that are evil on purpose, right? Umm. No. Not by default. We don't want to break crashme or trinity by default. I

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-02 Thread Pavel Machek
On Fri 2015-01-02 23:49:52, Jiri Kosina wrote: On Fri, 2 Jan 2015, Pavel Machek wrote: You also want to protect against binaries that are evil on purpose, right? Umm. No. Not by default. We don't want to break crashme or trinity by default. I thought trinity is issuing syscalls

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-02 Thread Jiri Kosina
On Fri, 2 Jan 2015, Jiri Kosina wrote: You also want to protect against binaries that are evil on purpose, right? Umm. No. Not by default. We don't want to break crashme or trinity by default. I thought trinity is issuing syscalls directly (would make more sense than going

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-02 Thread Jiri Kosina
On Fri, 2 Jan 2015, Pavel Machek wrote: You also want to protect against binaries that are evil on purpose, right? Umm. No. Not by default. We don't want to break crashme or trinity by default. I thought trinity is issuing syscalls directly (would make more sense than going through

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-02 Thread Richard Weinberger
Am 02.01.2015 um 20:46 schrieb Pavel Machek: Does this break trinity, crashme, and similar programs? If they fork() without execve() and a child dies very fast the next fork() will be throttled. This is why I'd like to make this feature disabled by default. Can you detect it died due to the

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-01 Thread Pavel Machek
On Tue 2014-12-30 10:40:15, Kees Cook wrote: > On Wed, Dec 24, 2014 at 1:39 PM, Richard Weinberger wrote: > > While exploring the offset2lib attack I remembered that > > grsecurity has an interesting feature to make such attacks > > much harder. Exploits can brute stack canaries often very easily

Re: [PATCH] [RFC] Deter exploit bruteforcing

2015-01-01 Thread Pavel Machek
On Tue 2014-12-30 10:40:15, Kees Cook wrote: On Wed, Dec 24, 2014 at 1:39 PM, Richard Weinberger rich...@nod.at wrote: While exploring the offset2lib attack I remembered that grsecurity has an interesting feature to make such attacks much harder. Exploits can brute stack canaries often very

Re: [PATCH] [RFC] Deter exploit bruteforcing

2014-12-30 Thread Richard Weinberger
Am 30.12.2014 um 19:40 schrieb Kees Cook: > On Wed, Dec 24, 2014 at 1:39 PM, Richard Weinberger wrote: >> While exploring the offset2lib attack I remembered that >> grsecurity has an interesting feature to make such attacks >> much harder. Exploits can brute stack canaries often very easily >> if

Re: [PATCH] [RFC] Deter exploit bruteforcing

2014-12-30 Thread Andy Lutomirski
On Tue, Dec 30, 2014 at 10:40 AM, Kees Cook wrote: > On Wed, Dec 24, 2014 at 1:39 PM, Richard Weinberger wrote: >> While exploring the offset2lib attack I remembered that >> grsecurity has an interesting feature to make such attacks >> much harder. Exploits can brute stack canaries often very

Re: [PATCH] [RFC] Deter exploit bruteforcing

2014-12-30 Thread Kees Cook
On Wed, Dec 24, 2014 at 1:39 PM, Richard Weinberger wrote: > While exploring the offset2lib attack I remembered that > grsecurity has an interesting feature to make such attacks > much harder. Exploits can brute stack canaries often very easily > if the target is a forking server like sshd or

Re: [PATCH] [RFC] Deter exploit bruteforcing

2014-12-30 Thread Kees Cook
On Wed, Dec 24, 2014 at 1:39 PM, Richard Weinberger rich...@nod.at wrote: While exploring the offset2lib attack I remembered that grsecurity has an interesting feature to make such attacks much harder. Exploits can brute stack canaries often very easily if the target is a forking server like

Re: [PATCH] [RFC] Deter exploit bruteforcing

2014-12-30 Thread Andy Lutomirski
On Tue, Dec 30, 2014 at 10:40 AM, Kees Cook keesc...@chromium.org wrote: On Wed, Dec 24, 2014 at 1:39 PM, Richard Weinberger rich...@nod.at wrote: While exploring the offset2lib attack I remembered that grsecurity has an interesting feature to make such attacks much harder. Exploits can brute

Re: [PATCH] [RFC] Deter exploit bruteforcing

2014-12-30 Thread Richard Weinberger
Am 30.12.2014 um 19:40 schrieb Kees Cook: On Wed, Dec 24, 2014 at 1:39 PM, Richard Weinberger rich...@nod.at wrote: While exploring the offset2lib attack I remembered that grsecurity has an interesting feature to make such attacks much harder. Exploits can brute stack canaries often very

[PATCH] [RFC] Deter exploit bruteforcing

2014-12-24 Thread Richard Weinberger
While exploring the offset2lib attack I remembered that grsecurity has an interesting feature to make such attacks much harder. Exploits can brute stack canaries often very easily if the target is a forking server like sshd or Apache httpd. The problem is that after fork() the child has by

[PATCH] [RFC] Deter exploit bruteforcing

2014-12-24 Thread Richard Weinberger
While exploring the offset2lib attack I remembered that grsecurity has an interesting feature to make such attacks much harder. Exploits can brute stack canaries often very easily if the target is a forking server like sshd or Apache httpd. The problem is that after fork() the child has by