Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAGXu5jJXqyN2ABvRxLsjhn3k_qbubw7SDxxk50Wqz=kOsLjSig@mail.gmail.com>
Date: Thu, 21 Apr 2016 13:33:15 -0700
From: Kees Cook <keescook@...omium.org>
To: Richard Weinberger <richard@....at>
Cc: "kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com>
Subject: Re: status: GRKERNSEC_BRUTE

On Mon, Nov 30, 2015 at 12:15 PM, Kees Cook <keescook@...omium.org> wrote:
> On Sun, Nov 29, 2015 at 2:54 PM, Richard Weinberger <richard@....at> wrote:
>> Am 24.11.2015 um 20:19 schrieb Kees Cook:
>>> Hi,
>>>
>>> While not strictly a _kernel_ self-protection mechanism, it's still
>>> something that I'd love to see upstream, so I'll ping about its status
>>> here too. :) Any updates on the brute force detector? (Last week I had
>>> someone suggest making this a "respawn cgroup" or something, if it's
>>> not workable as-is.) Anything we can help with?
>>
>> I can revive my patch and resend. Maybe it helps to collect
>> new ideas (or NAKs ;)).
>
> That would be great. Start by sending the series to kernel-hardening.
> We can comment on it before you send a version to lkml. (i.e. try to
> avoid NAKs...) :)

Hi!

Any updates on this? I think with the latest userspace ASLR
improvements from Android, this is becoming a more urgently needed
features. :)

-Kees

-- 
Kees Cook
Chrome OS & Brillo Security

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.