Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1521539pxb; Sun, 7 Mar 2021 22:41:25 -0800 (PST) X-Google-Smtp-Source: ABdhPJxRwTLXytTECN9Ofc/SldJ6e/Q1n/3TQ2OGQ0PlK5DBxqejAeh2qxVlbTcYjxAO53evK9Mm X-Received: by 2002:aa7:c0c7:: with SMTP id j7mr20439893edp.298.1615185685281; Sun, 07 Mar 2021 22:41:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1615185685; cv=none; d=google.com; s=arc-20160816; b=MYL6kFqTOBhfve4pu70Nf+DkSPmorXIXDmItp4HrKXA5xGpBx5Mb6T4JU4SFw/32Co 83h6lbuseJTPAznYOWgdt9S09+6EW4PoF/tlV6F287y2tHSo37lTQJXdZjEtlIgNIwp0 t8AYpDsZ5m9gdeMiiincFAQ3eDLev/radjhQGS7kQxim6lQOP0F2qKpAGusAuciQwuVQ t7JE9/Q/ZH1UnwtCufK9m+MBm2S2V8l3PRSWrAE/KDodUXq/GE1eu4X3WQVEzbelF+PC UjkdSNC1XW1SMInVAkBBytaUrkNF5ej5wCTg7T7qEWDn/Mkj3pR2C7woYyey4Glb04+o UEAA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:ironport-sdr :ironport-sdr; bh=EsRAO34FoNJAF4oFs9Qhm7jXtA4gMtnLRYQhBp6dHiU=; b=OBBsePCSUEnqGJGIA7Iq2MZfEGa+RJpdRGyd8YGZ8Wv1ys7HMDqssO7ngdpdbEQLU4 BlHTQLQuY62mN4XFsOpAwcIpOm7ggQI+xEow1hlVdMC67ERjqN12Bf3RP5g7wrYBXJrp b8PVar3CCMzHdmI9ZbyhvNuZg4JEpJZmkad+twLtEkZCMbScfHgD4hawgu/bbn85BtcN MYOcwVEd7T4KQFYg7UbG2Xl1AiDg9LFOIZe9EOmVZgKC1WE705TWkUCT/J8SwVygNom1 iiRWrIPM3APmOWrSoH1ihkW4dl2qY1lK2C3lrbqWyiXEY5wNue0DsbQPZaZqv+CBrfu5 Y5ZA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j20si6264763ejy.7.2021.03.07.22.41.02; Sun, 07 Mar 2021 22:41:25 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229580AbhCGRZw (ORCPT + 99 others); Sun, 7 Mar 2021 12:25:52 -0500 Received: from mga01.intel.com ([192.55.52.88]:11751 "EHLO mga01.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229457AbhCGRZm (ORCPT ); Sun, 7 Mar 2021 12:25:42 -0500 IronPort-SDR: 5Q7wxjbnS1+h/UWRldiUIfy+xsdpfJng+ta2IL95h9Lwf5/8Mrve1nj+OetunrEltcm41MyGMg LSMwoEqIu7lA== X-IronPort-AV: E=McAfee;i="6000,8403,9916"; a="207670084" X-IronPort-AV: E=Sophos;i="5.81,230,1610438400"; d="scan'208";a="207670084" Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 Mar 2021 09:25:41 -0800 IronPort-SDR: rSoFigCEmmTYnqnwUTH2pXaCT5FBs+xAJ1e4TvkEBQ41R2+ZebVFnZ6085RExhtLtl5o7mip47 upLDQWNxvz5w== X-IronPort-AV: E=Sophos;i="5.81,230,1610438400"; d="scan'208";a="430081838" Received: from tassilo.jf.intel.com ([10.54.74.11]) by fmsmga004-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 Mar 2021 09:25:41 -0800 Date: Sun, 7 Mar 2021 09:25:40 -0800 From: Andi Kleen To: John Wood Cc: Kees Cook , Jann Horn , Randy Dunlap , Jonathan Corbet , James Morris , Shuah Khan , "Serge E. Hallyn" , Greg Kroah-Hartman , linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, linux-kselftest@vger.kernel.org, kernel-hardening@lists.openwall.com Subject: Re: [PATCH v5 7/8] Documentation: Add documentation for the Brute LSM Message-ID: <20210307172540.GS472138@tassilo.jf.intel.com> References: <20210227153013.6747-1-john.wood@gmx.com> <20210227153013.6747-8-john.wood@gmx.com> <878s78dnrm.fsf@linux.intel.com> <20210302183032.GA3049@ubuntu> <20210307151920.GR472138@tassilo.jf.intel.com> <20210307164520.GA16296@ubuntu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210307164520.GA16296@ubuntu> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > processes created from it will be killed. If the systemd restart the network > daemon and it will crash again, then the systemd will be killed. I think this > way the attack is fully mitigated. Wouldn't that panic the system? Killing init is usually a panic. > > Or if it's a interactive login you log in again. > > First the login will be killed (if it fails with a fatal signal) and if it is > restarted, the process that exec() it again will be killed. In this case I think > that the threat is also completely mitigated. Okay so sshd will be killed. And if it gets restarted eventually init, so panic again. That's a fairly drastic consequence because even without panic it means nobody can fix the system anymore without a console. So probably the mitigation means that most such attacks eventually lead to a panic because they will reach init sooner or later. Another somewhat worrying case is some bug that kills KVM guests. So if the bug can be triggered frequently you can kill all the virtualization management infrastructure. I don't remember seeing a discussion of such drastic consequences in your description. It might be ok depending on the use case, but people certainly need to be aware of it. It's probably not something you want to have enabled by default ever. -Andi