Re: [PATCH v5 7/8] Documentation: Add documentation for the Brute LSM
From: Andi Kleen
Date: Sun Feb 28 2021 - 13:59:03 EST
John Wood <john.wood@xxxxxxx> writes:
> +
> +To detect a brute force attack it is necessary that the statistics shared by all
> +the fork hierarchy processes be updated in every fatal crash and the most
> +important data to update is the application crash period.
So I haven't really followed the discussion and also not completely read
the patches (so apologies if that was already explained or is documented
somewhere else).
But what I'm missing here is some indication how much
memory these statistics can use up and how are they limited.
How much is the worst case extra memory consumption?
If there is no limit how is DoS prevented?
If there is a limit, there likely needs to be a way to throw out
information, and so the attack would just shift to forcing the kernel
to throw out this information before retrying.
e.g. if the data is hold for the parent shell: restart the parent
shell all the time.
e.g. if the data is hold for the sshd daemon used to log in:
Somehow cause sshd to respawn to discard the statistics.
Do I miss something here? How is that mitigated?
Instead of discussing all the low level tedious details of the
statistics it would be better to focus on these "high level"
problems here.
-Andi