[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20101107152720.7e2c472e@lxorguk.ukuu.org.uk>
Date: Sun, 7 Nov 2010 15:27:20 +0000
From: Alan Cox <alan@...rguk.ukuu.org.uk>
To: Ingo Molnar <mingo@...e.hu>
Cc: Willy Tarreau <w@....eu>, Marcus Meissner <meissner@...e.de>,
security@...nel.org, mort@....com,
Peter Zijlstra <a.p.zijlstra@...llo.nl>, fweisbec@...il.com,
"H. Peter Anvin" <hpa@...or.com>, linux-kernel@...r.kernel.org,
jason.wessel@...driver.com, tj@...nel.org,
Andrew Morton <akpm@...ux-foundation.org>,
Linus Torvalds <torvalds@...ux-foundation.org>,
Thomas Gleixner <tglx@...utronix.de>
Subject: Re: [Security] [PATCH] kernel: make /proc/kallsyms mode 400 to
reduce ease of attacking
> This makes it _unsafe_ (for many types of attackers) to run an exploit locally.
They don't care.
Firstly it 's trivial to identify the true kernel version from all sorts
of other methods and secondly almost all exploiting is done by robots
running from box to box and which are completely disposable.
They simply *don't* care and if they do the rpm -q, tcp finger prints and
a few other tricks such as clock timing a couple of syscalls will answer
the question reliably anyway.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists