LWN: Comments on "Making attacks a little harder" https://lwn.net/Articles/415603/ This is a special feed containing comments posted to the individual LWN article titled "Making attacks a little harder". en-us Thu, 25 Sep 2025 04:57:55 +0000 Thu, 25 Sep 2025 04:57:55 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net 0400 /proc/kallsyms not in 2.6.37 https://lwn.net/Articles/419143/ https://lwn.net/Articles/419143/ kevinm <div class="FormattedComment"> Anyone who wants the effect can simply add:<br> <p> chmod 400 /proc/kallsyms<br> <p> to their /etc/rc.local or similar.<br> </div> Wed, 08 Dec 2010 12:27:49 +0000 Pointer values https://lwn.net/Articles/416544/ https://lwn.net/Articles/416544/ epa <div class="FormattedComment"> On second thoughts I realize that even if you knew the secret value you wouldn't be able to reverse the hash function to get the original pointers back. So if you wanted to hide the pointer values you'd need to encrypt them, with a much longer secret key than a mere 64 bits.<br> </div> Mon, 22 Nov 2010 10:35:18 +0000 0400 /proc/kallsyms not in 2.6.37 https://lwn.net/Articles/416380/ https://lwn.net/Articles/416380/ spender <div class="FormattedComment"> FYI, the patch has been reverted:<br> <a href="http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=33e0d57f5d2f079104611be9f3fccc27ef2c6b24">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-...</a><br> <p> -Brad<br> </div> Sat, 20 Nov 2010 00:56:27 +0000 Pointer values https://lwn.net/Articles/416177/ https://lwn.net/Articles/416177/ Cyberax <div class="FormattedComment"> Make an IOCTL and stop inventing lame interfaces?<br> </div> Thu, 18 Nov 2010 19:47:28 +0000 Pointer values https://lwn.net/Articles/416166/ https://lwn.net/Articles/416166/ andfarm <div class="FormattedComment"> Make it a truncated SHA1 hash, then? Same idea.<br> </div> Thu, 18 Nov 2010 18:40:54 +0000 Pointer values https://lwn.net/Articles/416116/ https://lwn.net/Articles/416116/ Cyberax <div class="FormattedComment"> And code to decrypt this XOR number will be published in 20 seconds after kernel release.<br> </div> Thu, 18 Nov 2010 15:50:22 +0000 Pointer values https://lwn.net/Articles/416062/ https://lwn.net/Articles/416062/ epa <div class="FormattedComment"> Generate a 64-bit random value at boot time, then XOR each pointer value with it and hash the result with SHA or similar. These pointers can be recorded in the log file safely; so an unprivileged user can see when two pointers are equal but no other information. The root user can ask the kernel for the secret random value and so decode the log file.<br> </div> Thu, 18 Nov 2010 13:12:17 +0000