lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
From: lbruno at gaesi.org (Luis Bruno)
Subject: Attacks based on predictable process IDs??

Wojciech Purczynski wrote:
> Your "current" linux doesn't seem to be stable yet ;) I haven't seen
> pids wider than 15 bits on any production system :)

/usr/include/asm/posix_types.h:	typedef int		__kernel_pid_t;
/usr/include/linux/types.h:	typedef __kernel_pid_t	pid_t;

The reason you don't see 32bit pids is described here:
http://www.ussg.iu.edu/hypermail/linux/kernel/0001.2/0169.html

-- 
Luis Bruno    C8-H10-N4-O2-CH3-CH2-OH
UTM 29T 629481 E 4511776 N  Alt: 576m


Powered by blists - more mailing lists