From owner-freebsd-security@freebsd.org Mon Jul 3 16:29:17 2017 Return-Path: Delivered-To: freebsd-security@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id C7AF69EA275 for ; Mon, 3 Jul 2017 16:29:17 +0000 (UTC) (envelope-from michelle@sorbs.net) Received: from hades.sorbs.net (hades.sorbs.net [72.12.213.40]) by mx1.freebsd.org (Postfix) with ESMTP id AAC5976929; Mon, 3 Jul 2017 16:29:17 +0000 (UTC) (envelope-from michelle@sorbs.net) MIME-version: 1.0 Content-transfer-encoding: 7BIT Content-type: text/plain; CHARSET=US-ASCII; format=flowed Received: from isux.com (firewall.isux.com [213.165.190.213]) by hades.sorbs.net (Oracle Communications Messaging Server 7.0.5.29.0 64bit (built Jul 9 2013)) with ESMTPSA id <0OSI0045IWTHYR00@hades.sorbs.net>; Mon, 03 Jul 2017 09:36:55 -0700 (PDT) Subject: Re: The Stack Clash vulnerability To: Ed Maste , "freebsd-security@freebsd.org" References: From: Michelle Sullivan Message-id: <3bca2dbd-dc2f-ca7a-e0ce-eb7d6cf0b3e5@sorbs.net> Date: Mon, 03 Jul 2017 18:29:09 +0200 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:49.0) Gecko/20100101 Firefox/49.0 SeaMonkey/2.46 In-reply-to: X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Jul 2017 16:29:17 -0000 Ed Maste wrote: > On 21 June 2017 at 20:22, Ed Maste wrote: >> These changes are expected to be >> committed to FreeBSD soon, and from there they will be merged to >> stable branches and into updates for supported releases. > The changes have now been merged to HEAD in r320317. > https://svnweb.freebsd.org/changeset/base/320317 > _______________________________________________ > Been watching for it in 10-STABLE... didn't see it go in... did I miss it? Regards, Michelle FWIW, been testing on various versions... seems that the Qualsys test code are 3 examples. 'fgpe' and 'fgpu' seem to work on pre-11 under the following senario... ulimit -v is set to unlimited. 'CVE-2017-1085' appears not to work, setting ulimit -v to anything but unlimited seems to break both 'fgpe' and 'fgpu' (to reasonable values I have tested so far).... it also seemed only to work when all virtual memory was exhausted (which made sizable processes and considerable allocation/run times.) Follows is around 32G limit on the vm size (which unless it's one of my DB servers) is about 16 times more than any process should need. [michelle@10amd64 /usr/home/michelle]$ ulimit -Hv 34896609280 [michelle@10amd64 /usr/home/michelle]$ ulimit -a socket buffer size (bytes, -b) unlimited core file size (blocks, -c) unlimited data seg size (kbytes, -d) 33554432 file size (blocks, -f) unlimited max locked memory (kbytes, -l) 64 max memory size (kbytes, -m) unlimited open files (-n) 294246 pipe size (512 bytes, -p) 1 stack size (kbytes, -s) 524288 cpu time (seconds, -t) unlimited max user processes (-u) 14043 virtual memory (kbytes, -v) 34896609280 swap size (kbytes, -w) unlimited [michelle@10amd64 /usr/home/michelle]$ time ./CVE-2017-1085 died in main: 49 real 45m3.659s user 3m45.577s sys 41m14.028s [michelle@10amd64 /usr/home/michelle]$ time ./fgpu Segmentation fault: 11 real 49m1.494s user 2m38.926s sys 46m17.542s [michelle@10amd64 /usr/home/michelle]$ time ./fgpe died in alloc: 38 real 46m9.318s user 2m25.527s sys 43m38.170s [michelle@10amd64 /usr/home/michelle]$ Same system only 'exploited' when 'unlimited' as follows: [michelle@10amd64 /usr/home/michelle]$ ./fgpe char at 0x7ffff4297000: 41; final dist 34998 (198609078) [michelle@10amd64 /usr/home/michelle]$ ./fgpu char at 0x7ffffffde000: 41 Though the 'CVE-2017-1085' only seg faulted... [michelle@10amd64 /usr/home/michelle]$ ./CVE-2017-1085 Segmentation fault: 11 All amd64 (haven't gotten around to testing i386 yet) Know of any other tests... or are these pretty typical/comprehensive? (being that setting a system wide hard limit of say 32G would seem to work around the issue...) Thanks in advance.. -- Michelle Sullivan http://www.mhix.org/ From owner-freebsd-security@freebsd.org Wed Jul 5 01:32:59 2017 Return-Path: Delivered-To: freebsd-security@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id C0CACD9EFE6 for ; Wed, 5 Jul 2017 01:32:59 +0000 (UTC) (envelope-from carpeddiem@gmail.com) Received: from mail-io0-x22d.google.com (mail-io0-x22d.google.com [IPv6:2607:f8b0:4001:c06::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 80D696A4F8 for ; Wed, 5 Jul 2017 01:32:59 +0000 (UTC) (envelope-from carpeddiem@gmail.com) Received: by mail-io0-x22d.google.com with SMTP id z62so78241436ioi.3 for ; Tue, 04 Jul 2017 18:32:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc; bh=Egp1IIa1kZrXEABYaHMKHvwoc1efrrbwY3L5iyY/0GQ=; b=tSdbkkz+0OoEBQioAIAFg8ggZglQHYby5BDuNhyBC5lTc15NkYf+3JFWBIDasEad4u JsAgLJTE5EE/foNFa4T9+5XpfiXKWe2VH9TBxb8MhzLAqbuQVg42Wav8bYzoLL8GpOBf 1pozJft7L1ab+2D90h3+Zhf2CVn94PSDLhebiuyK0QT5h++h1oEmpZNsOReJW5ulqiUe 8YA9FOwTT/yzPJsD2HD8fgw59jz4es5+LdzvPJ2dgBXLooKTUrvskSj6KDTOMEMO5JRe 6hOJkSzBMVFStCpi30xgbHJYq9GAEShXhFyaiW73bizHjzZuqiFpKLiGctPVgLqRMjr0 YpRw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc; bh=Egp1IIa1kZrXEABYaHMKHvwoc1efrrbwY3L5iyY/0GQ=; b=q00CuDR3xicngGFCvIF3LJmT7H177agX3DnPa3+351MUhXWIhYvsvt9HsgPounk4HD I9bsLbPeNPgih1TWqJ9Ghjp15Y20vLbbDh+DngGN6CrAz5EwrAnBf8T3FUnX4SqGVcn3 8TAsN+2Gavmqj2JBCW3tKgibnGPPQGb+SEYdqLATOTbPTbuRR1sputtY05RhwNKNHytI rOs1ntmiDmQ3zCbg03CrzuPpz1WwpodO/VAwXe8EU9SkZ6W6em57iArHQo1LLJXPxr2K EDxJyV6Ial4r/HpJDB/72s5k9EWYE0bFcuU52cBaDehYgkaZkbJv7IfLM02GpM3jxHV7 CL2g== X-Gm-Message-State: AKS2vOx2VuuLq6ZxLseV6gGBqp0YhWEPOv9ZhVXR4ybfeoayP6f1TQe7 atqJj6LJedTde7u58lFJzefSvAlZHg== X-Received: by 10.107.8.23 with SMTP id 23mr40315949ioi.159.1499218378512; Tue, 04 Jul 2017 18:32:58 -0700 (PDT) MIME-Version: 1.0 Sender: carpeddiem@gmail.com Received: by 10.107.10.85 with HTTP; Tue, 4 Jul 2017 18:32:37 -0700 (PDT) In-Reply-To: <3bca2dbd-dc2f-ca7a-e0ce-eb7d6cf0b3e5@sorbs.net> References: <3bca2dbd-dc2f-ca7a-e0ce-eb7d6cf0b3e5@sorbs.net> From: Ed Maste Date: Tue, 4 Jul 2017 21:32:37 -0400 X-Google-Sender-Auth: zsaij2e_OFPNEzlQ4MulFFjp9c8 Message-ID: Subject: Re: The Stack Clash vulnerability To: Michelle Sullivan Cc: "freebsd-security@freebsd.org" Content-Type: text/plain; charset="UTF-8" X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 05 Jul 2017 01:32:59 -0000 On 3 July 2017 at 12:29, Michelle Sullivan wrote: > > Been watching for it in 10-STABLE... didn't see it go in... did I miss it? It hasn't yet been merged -- there were a couple of issues with the initial commit which were fixed shortly after in HEAD. We are now waiting on the MFC timer for the followup fixes (to provide time to find any other potential issue). > Know of any other tests... I'm not aware of any. From owner-freebsd-security@freebsd.org Wed Jul 5 01:56:29 2017 Return-Path: Delivered-To: freebsd-security@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 286D8D9F61C for ; Wed, 5 Jul 2017 01:56:29 +0000 (UTC) (envelope-from shawn.webb@hardenedbsd.org) Received: from mail-wm0-x235.google.com (mail-wm0-x235.google.com [IPv6:2a00:1450:400c:c09::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id A84896AD10 for ; Wed, 5 Jul 2017 01:56:28 +0000 (UTC) (envelope-from shawn.webb@hardenedbsd.org) Received: by mail-wm0-x235.google.com with SMTP id i127so151974409wma.0 for ; Tue, 04 Jul 2017 18:56:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=hardenedbsd-org.20150623.gappssmtp.com; s=20150623; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=mHI4RZy/gRtHApc1BHmxWDWFbpwNoOO3ociLY96argg=; b=RlQhLce2FVoiRNgBxomsbXVUmEcDkmyOgIvpwUweSg0R1vN92+5G5wwGQOmG6lFwb6 WviHx4YoTt0QwK0dNpwhdiL7MvZVlG2fxBGeLcRaYdkifJHY9vrJh5/oJGrT5p8N8JUC MA6+5pjtaVCHA+PpJuVMVCvpEamuf5q2Reja0mkO1iEhBzMqw/cMJuk08+zKA3Oyoqb/ J0mwqo9UYELful6xoGERH1Z/AVJkGbXOcEVqZKFuIBbHujJxhGVzD/9Y3g9NzljbLLOs Tjw59A0pkM46x+u62DJl4JWUqHkr8YUhFBVZQ8tNIcoC/7NcNx17oh01GnZjSKDwX540 BpNg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=mHI4RZy/gRtHApc1BHmxWDWFbpwNoOO3ociLY96argg=; b=r++emvZMQQ/7WPpSZjKTZ481RVE8Sv+lWG2Fi2E3Egm6cMK/DEMpMfMKOuXIIkyEc9 5iFvOqEd+RI0ZHq35pwa6o+BN6TkFAqhBBoYpXHV4ZbiX9p0R+B56Grua56eJhPm393T LEBuJEdT2NhKTnFxEZW0rJDNjw5wTGlFfqP+Kysa0+q934LWRG3oMkVoHZge+ibb/qd3 VuKgRXTKIdIVkkyWJgmL2lUztykzMBj7j4fHsRIR9VPxasT9AY3bQZl+Hx7gQ03NfmUA s8vzsS4zz9FYumJmIuyfGok9fAQV46CC6uAfovN0tzYyIXC4/uHDINv8YEHiB6u0CA6W EaOA== X-Gm-Message-State: AKS2vOwyzqKv/sAlD0Ga2u4O1AmqbqQl+RD9DmGsdcp6aduzVrFVrIMX 8xWQgj/QAJbz/kh0 X-Received: by 10.80.170.74 with SMTP id p10mr20427145edc.33.1499219786246; Tue, 04 Jul 2017 18:56:26 -0700 (PDT) Received: from mutt-hbsd (pool-100-16-230-154.bltmmd.fios.verizon.net. [100.16.230.154]) by smtp.gmail.com with ESMTPSA id t17sm9310060edd.69.2017.07.04.18.56.24 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Tue, 04 Jul 2017 18:56:25 -0700 (PDT) Date: Tue, 4 Jul 2017 21:56:21 -0400 From: Shawn Webb To: Ed Maste Cc: Michelle Sullivan , "freebsd-security@freebsd.org" Subject: Re: The Stack Clash vulnerability Message-ID: <20170705015621.6bvp75vwdjeyo4vo@mutt-hbsd> References: <3bca2dbd-dc2f-ca7a-e0ce-eb7d6cf0b3e5@sorbs.net> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="4uulp2m5ruzart6f" Content-Disposition: inline In-Reply-To: X-Operating-System: FreeBSD mutt-hbsd 12.0-CURRENT FreeBSD 12.0-CURRENT X-PGP-Key: http://pgp.mit.edu/pks/lookup?op=vindex&search=0x6A84658F52456EEE User-Agent: NeoMutt/20170609 (1.8.3) X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 05 Jul 2017 01:56:29 -0000 --4uulp2m5ruzart6f Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Tue, Jul 04, 2017 at 09:32:37PM -0400, Ed Maste wrote: > On 3 July 2017 at 12:29, Michelle Sullivan wrote: > > > > Been watching for it in 10-STABLE... didn't see it go in... did I miss = it? >=20 > It hasn't yet been merged -- there were a couple of issues with the > initial commit which were fixed shortly after in HEAD. We are now > waiting on the MFC timer for the followup fixes (to provide time to > find any other potential issue). >=20 > > Know of any other tests... >=20 > I'm not aware of any. I've publicly reported at least one issue: https://lists.freebsd.org/pipermail/freebsd-current/2017-July/066468.html It also seems that setting stack_guard_page to any positive integer value greater than 1 causes issues. For example, lang/rust will fail to build and some GUI applications will fail to start. I've also noticed a regression with mysql56-server when stack_guard_page is set to a positive integer value greater than 1. All my testing so far has only been on amd64. I have arm64 devices running the same code, but they don't do nearly as intensive work as my amd64 systems. It seems the MAP_GUARD work needs more exhaustive testing on 12-CURRENT. Thanks, --=20 Shawn Webb Cofounder and Security Engineer HardenedBSD GPG Key ID: 0x6A84658F52456EEE GPG Key Fingerprint: 2ABA B6BD EF6A F486 BE89 3D9E 6A84 658F 5245 6EEE --4uulp2m5ruzart6f Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEKrq2ve9q9Ia+iT2eaoRlj1JFbu4FAllcR0MACgkQaoRlj1JF bu67lA/7BeCw+jqqKambWT7JB9cBHQ9iJUJg3TgbiVCnwslxZWUql7fzHQDrzfkF d8JRRyIghd+r5bPfwbCIAAzzzB4SvwLZXDuZDCCailW7WFxWB7LisX06Bn4dm0Yw i7hIc9fYewxbffSOAvg+6PFw6Pp55KKd9NBuTRNufO48JDMK8jaJuATbHCj3y17k cXpQYrrABZ3mhFPm9HrmIC4BKKOOi6FpFi8bmwK7sU7etGl/S7k3itI1HMdk5qo4 O2EjBwhlWCp5UcmBhNZY5N0IV8US6wxTNqTB5ympvd6ysBKH70zAyESG5cmHuoMA YVsZz9/pns9ivPLgReSBQ9Bex+ZbIgeO/XM4ZfDH3J2uTTxshXtaYbZGYpxPL/PG uPesvtOFa/SKXRvjwodRX5NkI+/4zVVCjhu7rEuT4+2MJUfPrg5kGXiMwA+cZdmQ UOZXobpGmgWTHa/M1J/QMnGpoVgmpLNLEuZVVIzjSqbwR3afbEsGA0/ek/8PRa3i VRH7F0zetmv92dpEm8BROpOhh99UC9j/jWqCdVDKIf9r5xab6as74QIgKeC3zgs1 q1Zw0othKwwca5FHegjakGo7sj1d41E5jDo1OhesVDfDabv96oSCDFXW3A73uBPr 5NxG84Zip3wbSZXus47hxmo/FnHIElLT89ypigb9gYHaJSwAUfU= =BNL9 -----END PGP SIGNATURE----- --4uulp2m5ruzart6f-- From owner-freebsd-security@freebsd.org Wed Jul 5 10:14:08 2017 Return-Path: Delivered-To: freebsd-security@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id B777ADA71E7 for ; Wed, 5 Jul 2017 10:14:08 +0000 (UTC) (envelope-from amutu@amutu.com) Received: from mail-oi0-x22c.google.com (mail-oi0-x22c.google.com [IPv6:2607:f8b0:4003:c06::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 797917A57E for ; Wed, 5 Jul 2017 10:14:08 +0000 (UTC) (envelope-from amutu@amutu.com) Received: by mail-oi0-x22c.google.com with SMTP id p188so121052740oia.0 for ; Wed, 05 Jul 2017 03:14:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amutu-com.20150623.gappssmtp.com; s=20150623; h=mime-version:from:date:message-id:subject:to; bh=BP5kgIZ5trhuG7fUgdFuGeVdMDkRsx7VlPRWaTeAzGQ=; b=Ok7P+2++aScdQNwjKmB4dc7mi0w7poeJo7b9pjm8ugFpfTpKiKq5/notBYaBEMXYie NNqigfBn1Kz1QIO7HwwxoExCYEeP9rv27EHqsuKywHCtetkQSqOaR0vTZ9AuQgLS6KOg CiD1W/VcuDjb/BAHJxiE/ibRYwCS7rxVDCbff+1Y2KeRb4g6pvMnOgzvIdLa8KhiXcFZ eHyGppDvnfpV4DCHH5S+GBPoRj9gMIS36hyy66Z4dXbjMNrbfYnrL+bML6/Ow7crP0jP Kz9N+b+ZB8fub2WW1E8Hqrwn2kIpVnML6KgG00EE6TjYPdqNWUF1ZAbam2ILm/6jAE4L nZ7A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=BP5kgIZ5trhuG7fUgdFuGeVdMDkRsx7VlPRWaTeAzGQ=; b=uQ+6rDIIuwt5Ht2nkXEfpoCUDfH0DJRl/JuflgHnl5qOB8slbQxLfZP7QNLTLSJnxy Ua0bAjCopMW7yvi/hCDR3sz9R/6nmI72YlbbmCOfNfFi9Z8ajq609lUK0s2cwO7ng4D+ Iu/FVj7urtBaBjifJVaeI8/B6feEROd0R4Vyk2ZaVxefb6W0kQO6pifUaHFRjiV4+dIb L+OEFlosyhs/Rfu3f0dCdRyaoAWbuNrWLoXa06lEkjEP7oFiqh1RrkaxkPq/ur16jAnu Q33xMCCcl+14kfd7OSKtIZ7+WSQVk07UdYjSH5/grQWChNdlFXhwlBDi/cDCfLin9+7p CSQw== X-Gm-Message-State: AKS2vOxO4eikcRtffbHiZZAWfYegbqJUp4fv6sMJqDX9fgTXUY3BLILJ 4ey+yLDKkqfeO9PRwF5YGw== X-Received: by 10.202.83.77 with SMTP id h74mr27340345oib.194.1499249647720; Wed, 05 Jul 2017 03:14:07 -0700 (PDT) Received: from mail-oi0-f46.google.com (mail-oi0-f46.google.com. [209.85.218.46]) by smtp.gmail.com with ESMTPSA id w131sm41280070oiw.30.2017.07.05.03.14.07 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 05 Jul 2017 03:14:07 -0700 (PDT) Received: by mail-oi0-f46.google.com with SMTP id x187so64014755oig.3; Wed, 05 Jul 2017 03:14:07 -0700 (PDT) X-Received: by 10.202.190.214 with SMTP id o205mr23175726oif.70.1499249646968; Wed, 05 Jul 2017 03:14:06 -0700 (PDT) MIME-Version: 1.0 Received: by 10.74.133.136 with HTTP; Wed, 5 Jul 2017 03:13:46 -0700 (PDT) From: Jov Date: Wed, 5 Jul 2017 18:13:46 +0800 X-Gmail-Original-Message-ID: Message-ID: Subject: devel/hardening-check needs a committer To: freebsd-security@freebsd.org, FreeBSD Ports Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.23 X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 05 Jul 2017 10:14:08 -0000 PR: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D220245 It is a tool ported from debian,used to check binaries for security hardening features,like this: > $hardening-check /usr/sbin/sshd > /usr/sbin/sshd: > Position Independent Executable: yes > Stack protected: yes > Fortify Source functions: yes ---//not supported on FreeBSD > Read-only relocations: yes > Immediate binding: yes More info: https://wiki.debian.org/Hardening Thanks very much=EF=BC=81 Jov From owner-freebsd-security@freebsd.org Wed Jul 5 18:03:32 2017 Return-Path: Delivered-To: freebsd-security@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A622CD8C676; Wed, 5 Jul 2017 18:03:32 +0000 (UTC) (envelope-from lists@opsec.eu) Received: from home.opsec.eu (home.opsec.eu [IPv6:2001:14f8:200::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 6E84E661C8; Wed, 5 Jul 2017 18:03:32 +0000 (UTC) (envelope-from lists@opsec.eu) Received: from pi by home.opsec.eu with local (Exim 4.89 (FreeBSD)) (envelope-from ) id 1dSoeC-000GJF-PS; Wed, 05 Jul 2017 20:03:32 +0200 Date: Wed, 5 Jul 2017 20:03:32 +0200 From: Kurt Jaeger To: Jov Cc: freebsd-security@freebsd.org, FreeBSD Ports Subject: Re: devel/hardening-check needs a committer Message-ID: <20170705180332.GI65214@home.opsec.eu> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Mailman-Approved-At: Wed, 05 Jul 2017 21:20:19 +0000 X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 05 Jul 2017 18:03:32 -0000 Hi! > PR: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=220245 > > It is a tool ported from debian,used to check binaries for security > hardening features,like this: Done. Thanks! -- pi@opsec.eu +49 171 3101372 3 years to go !