From: Vasiliy Kulikov <segoon@openwall.com>
To: kernel-hardening@lists.openwall.com
Subject: Re: [kernel-hardening] base address for shared libs
Date: Thu, 11 Aug 2011 12:32:59 +0400 [thread overview]
Message-ID: <20110811083259.GA5429@albatros> (raw)
In-Reply-To: <20110725192048.GA21675@albatros>
Solar,
The problem with ASCII-armor is that it contradicts good ALSR entropy.
E.g. with 12 bits of entropy the maximum library size to fit in low 16
MB is zero bytes.
PaX has 16 bits of entropy, so ASCII-armor would only hurt entropy.
Ubuntu (and most of distros) has 12 bits. Kees says it makes sense to
enable ASCII-armor for exec-shield only, as e-s already has very poor
entropy.
Upstream has 8 bits for some reason, but AFAICS every distro increase
the limit.
It makes sense to have e.g. 10 bits of entropy for 32-bit environments,
but it would help only for tiny programs (hopefully, most of Owl
programs). It would not work for any python/GUI/Java, Apache with many
modules, TomCat, etc.
pipacs' position is that exploitation of C-string buffer overflows is
rather rare nowadays, and heap overflows, buffer overflows, math
miscalculation, etc. are much more often => C-string buffer overflow is
not something which worth specific protection.
IMO it makes sense for Owl to have e.g. 10 bits of entropy for libs and
use ASCII-armor. But it makes very little sense for upstream. Or even
use 16 bits as PaX does and don't use ASCII-armor at all. ASCII-armor
has rather limited usage - prevention of ret2libc via exploitation of
C-string buffer overflows. But it is already included in ASLR, which
does much more. Probably we should concentrate on more generic things,
like ASLR?
Solar, what do you think?
Thanks,
--
Vasiliy Kulikov
http://www.openwall.com - bringing security into open computing environments
next prev parent reply other threads:[~2011-08-11 8:32 UTC|newest]
Thread overview: 16+ messages / expand[flat|nested] mbox.gz Atom feed top
2011-07-23 16:22 [kernel-hardening] base address for shared libs Solar Designer
2011-07-24 8:51 ` Vasiliy Kulikov
2011-07-24 14:27 ` Solar Designer
2011-07-24 18:18 ` Vasiliy Kulikov
2011-07-25 19:20 ` Vasiliy Kulikov
2011-08-11 8:32 ` Vasiliy Kulikov [this message]
2011-08-12 3:57 ` Solar Designer
2011-08-12 4:21 ` Solar Designer
2011-08-12 8:20 ` Vasiliy Kulikov
2011-08-12 9:20 ` Solar Designer
2011-08-12 9:52 ` Vasiliy Kulikov
2011-08-12 10:04 ` Solar Designer
2011-08-12 10:06 ` Vasiliy Kulikov
2011-07-29 9:27 ` Vasiliy Kulikov
2011-07-30 18:38 ` Vasiliy Kulikov
2011-07-30 18:43 ` Vasiliy Kulikov
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20110811083259.GA5429@albatros \
--to=segoon@openwall.com \
--cc=kernel-hardening@lists.openwall.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox