[PATCH v5 7/8] Documentation: Add documentation for the Brute LSM
ak at linux.intel.com
Sun Feb 28 18:56:45 UTC 2021
John Wood <john.wood at gmx.com> writes:
> +To detect a brute force attack it is necessary that the statistics shared by all
> +the fork hierarchy processes be updated in every fatal crash and the most
> +important data to update is the application crash period.
So I haven't really followed the discussion and also not completely read
the patches (so apologies if that was already explained or is documented
But what I'm missing here is some indication how much
memory these statistics can use up and how are they limited.
How much is the worst case extra memory consumption?
If there is no limit how is DoS prevented?
If there is a limit, there likely needs to be a way to throw out
information, and so the attack would just shift to forcing the kernel
to throw out this information before retrying.
e.g. if the data is hold for the parent shell: restart the parent
shell all the time.
e.g. if the data is hold for the sshd daemon used to log in:
Somehow cause sshd to respawn to discard the statistics.
Do I miss something here? How is that mitigated?
Instead of discussing all the low level tedious details of the
statistics it would be better to focus on these "high level"
More information about the Linux-security-module-archive