LWN: Comments on "Handling brute force attacks in the kernel" https://lwn.net/Articles/849531/ This is a special feed containing comments posted to the individual LWN article titled "Handling brute force attacks in the kernel". en-us Sat, 08 Nov 2025 11:32:29 +0000 Sat, 08 Nov 2025 11:32:29 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net Handling brute force attacks in the kernel https://lwn.net/Articles/851234/ https://lwn.net/Articles/851234/ jch <div class="FormattedComment"> Why does it kill the process hierarchy rather than just causing fork to fail?<br> <p> </div> Wed, 31 Mar 2021 13:21:17 +0000 Handling brute force attacks in the kernel https://lwn.net/Articles/849815/ https://lwn.net/Articles/849815/ smurf <div class="FormattedComment"> So? The failing child will then log the problem and exit. It will not die with a segfault or similar, thus it won&#x27;t trigger Brute.<br> <p> </div> Fri, 19 Mar 2021 07:36:20 +0000 Handling brute force attacks in the kernel https://lwn.net/Articles/849810/ https://lwn.net/Articles/849810/ Cyberax <div class="FormattedComment"> Not necessarily, if exec() fails for some reason. E.g. a binfmt handler was accidentally removed and foreign binaries can no longer run (happened to me a while ago when I was testing a cross-image).<br> </div> Fri, 19 Mar 2021 05:45:38 +0000 Handling brute force attacks in the kernel https://lwn.net/Articles/849809/ https://lwn.net/Articles/849809/ dtlin Wouldn't they die after <tt>exec</tt>, thus not sharing memory layout and not triggering this mitigation? Fri, 19 Mar 2021 05:43:49 +0000 Handling brute force attacks in the kernel https://lwn.net/Articles/849796/ https://lwn.net/Articles/849796/ rahulsundaram <div class="FormattedComment"> <font class="QuotedText">&gt; I hardly understand what is &#x27;assosiated process&#x27;. </font><br> <p> I think that&#x27;s answered in the article as well. Look for &#x27;fork&#x27;.<br> </div> Thu, 18 Mar 2021 23:41:31 +0000 Handling brute force attacks in the kernel https://lwn.net/Articles/849794/ https://lwn.net/Articles/849794/ Cyberax <div class="FormattedComment"> <font class="QuotedText">&gt; For &quot;slow brute force&quot; variants, the absolute number of crashes in the hierarchy is compared against a threshold of 200. Some way to configure these values would seem like a desirable addition to Brute. </font><br> I can&#x27;t wait for a bug report with a description: &quot;Finally, a thing that has killed systemd for good!&quot; because systemd had to restart a lot of failing daemons in short order.<br> </div> Thu, 18 Mar 2021 23:11:00 +0000 Handling brute force attacks in the kernel https://lwn.net/Articles/849791/ https://lwn.net/Articles/849791/ amarao <div class="FormattedComment"> I hardly understand what is &#x27;assosiated process&#x27;. My shell? My session? My seat? X server? Guilty by association, I suppose. Should software in a pacemaker of that loosy programmer to be included in the &#x27;assosiated list&#x27;?<br> </div> Thu, 18 Mar 2021 23:02:26 +0000 Handling brute force attacks in the kernel https://lwn.net/Articles/849790/ https://lwn.net/Articles/849790/ rahulsundaram <div class="FormattedComment"> From the article: &quot;Brute kills all of the processes associated with the attack&quot; - does this not answer your question?<br> </div> Thu, 18 Mar 2021 22:51:37 +0000 Handling brute force attacks in the kernel https://lwn.net/Articles/849789/ https://lwn.net/Articles/849789/ amarao <div class="FormattedComment"> Can I ask avout consequences of such protection? If I&#x27;m a loosy programmer and my freshly written program had crashed 200 times, what penalty waits me?<br> <p> Killing my shell, my editor, my dog, or what?<br> </div> Thu, 18 Mar 2021 22:46:02 +0000 Handling brute force attacks in the kernel https://lwn.net/Articles/849704/ https://lwn.net/Articles/849704/ walters <div class="FormattedComment"> I haven&#x27;t followed closely, but <a href="https://lwn.net/Articles/808048/">https://lwn.net/Articles/808048/</a> seems a lot more promising to me because it allows lifting all these heuristics out of the kernel - a hybrid eBPF + userspace process can access more semantic information; say things like &quot;did this process receive packets from an untrusted network recently&quot;. And it can be much more configurable, e.g. one could easily recode it to force a process like this to dump core for offline analysis instead, etc.<br> <p> <p> </div> Thu, 18 Mar 2021 12:55:20 +0000 Et tu, Brute? https://lwn.net/Articles/849691/ https://lwn.net/Articles/849691/ istenrot <div class="FormattedComment"> You can always build your own kernel with LSM modules of your choice.<br> </div> Thu, 18 Mar 2021 10:08:09 +0000 Et tu, Brute? https://lwn.net/Articles/849688/ https://lwn.net/Articles/849688/ ale2018 <div class="FormattedComment"> I wish using LSM as a common frame supported an option to disable all of such modules with a single stroke.<br> <p> Security is undoubtedly a necessity, and security modules are certainly useful for many users. However, I fear the moment when I&#x27;ll have to spend hours to understand why something doesn&#x27;t work until finally resolving to add &quot;brute=0&quot; right after &quot;apparmor=0&quot; on GRUB_CMDLINE_LINUX.<br> <p> </div> Thu, 18 Mar 2021 09:49:23 +0000