Re: RFC/PATCH: Random pid generation

From: Krzysztof Halasa (khc@intrepid.pm.waw.pl)
Date: Fri Jan 14 2000 - 19:45:05 EST


Chris Evans <chris@ferret.lmh.ox.ac.uk> writes:

> A 32 bit pid_t is more interesting (and plausible). Assuming a _signed_
> pid_t, a rather high rate of 1000 exploit attempts/second, and a 100% race
> success when the right pid is guessed
>
> .. you take on average 11.5 days to exploit. At 100% CPU. That's not going
> to go unnoticed.

... maybe. I don't know if 30 days at 30% CPU or 30 days * 8 hrs * 100% CPU
would be detected or not.

OTOH chances are you'll get it after a day - I don't like the idea
of having 90% probability that no one exploits some known race on my
system this week.

-- 
Krzysztof Halasa
Network Administrator

- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Sun Jan 23 2000 - 21:00:13 EST