Date: Thu, 21 Aug 2014 10:55:41 -0500 From: Bryan Drewery <bdrewery@FreeBSD.org> To: Ronald Klop <ronald-lists@klop.ws>, Ports FreeBSD <freebsd-ports@freebsd.org> Subject: Re: [CFT] SSP Package Repository available Message-ID: <53F6167D.2030303@FreeBSD.org> In-Reply-To: <op.xkxx31g5kndu52@ronaldradial.radialsg.local> References: <523D79CD.2090302@FreeBSD.org> <53F4CE0E.8040106@FreeBSD.org> <op.xkxx31g5kndu52@ronaldradial.radialsg.local>
next in thread | previous in thread | raw e-mail | index | archive | help
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --3cvpddJPLVi4sHvP3w9GB7dlEdgTSik23 Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: quoted-printable On 8/21/2014 6:56 AM, Ronald Klop wrote: > On Wed, 20 Aug 2014 18:34:22 +0200, Bryan Drewery <bdrewery@freebsd.org= > > wrote: >=20 >> On 9/21/2013 5:49 AM, Bryan Drewery wrote: >>> Ports now support enabling Stack Protector [1] support on FreeBSD 10 >>> i386 and amd64, and older releases on amd64 only currently. >>> >>> Support may be added for earlier i386 releases once all ports properl= y >>> respect LDFLAGS. >>> >>> To enable, just add WITH_SSP=3Dyes to your make.conf and rebuild all >>> ports. >>> >>> The default SSP_CLFAGS is -fstack-protector, but -fstack-protector-al= l >>> may optionally be set instead. >>> >>> Please help test this on your system. We would like to eventually ena= ble >>> this by default, but need to identify any major ports that have run-t= ime >>> issues due to it. >>> >>> [1] https://en.wikipedia.org/wiki/Buffer_overflow_protection >>> >> >> We have not had any feedback on this yet and want to get it enabled by= >> default for ports and packages. >> >> We now have a repository that you can use rather than the default to >> help test. We need your help to identify any issues before switching t= he >> default. >> >> This repository is available for: >> >> head >> 10.0 >> 9.1,9.2,9.3 >> >> It is not available for 8.4. If someone is willing to test on 8.4 I wi= ll >> build a repository for it. >> >> Place this in /usr/local/etc/pkgs/repos/FreeBSD_ssp.conf: >> >> FreeBSD: { enabled: no } >> FreeBSD_ssp: { >> url: "pkg+http://pkg.FreeBSD.org/${ABI}/ssp", >> mirror_type: "srv", >> signature_type: "fingerprints", >> fingerprints: "/usr/share/keys/pkg", >> enabled: yes >> } >> >> Once that is done you should force reinstall packages from this >> repository: >> >> pkg update >> pkg upgrade -f >> >> Thanks for your help! >> Bryan Drewery >> On behalf of portmgr. >> >=20 >=20 > Hi, >=20 > Is it necessary to upgrade all packages at once or can I just enable > WITH_SSP and upgrade ports as they are updated in the ports tree? >=20 You can let them update on their own if you wish. Of course SSP won't be in the binaries until they are rebuilt. --=20 Regards, Bryan Drewery --3cvpddJPLVi4sHvP3w9GB7dlEdgTSik23 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (MingW32) iQEcBAEBAgAGBQJT9hZ9AAoJEDXXcbtuRpfPipAIAJbtCK1YOhC2AFy83x/GB2Ec TieOoWYQPeatIZLsLG39cSnI/BoDa9sSvxFun987L27fvyu/rr1OY/4/ojgcj2Fq eOYml00zFBX5eRbGGOCZ7p7W4Kt88gcuxyf0lYoCFBTqfXeOsBXB3iBYduJ4QD8f svQBZs2SOonZ8XE9vWj1ri1a3dljRNFTb4vaeVqvSu36TF6xZCobfu38xytmt36T HAtNyHkx5EqRFEdD+CHz/BWFptjw9AhSPGKUYwTev5+jUZjwqWh6ImznFKsDS8od WsQubg/A5RQE2A6VxjC/vxG8P5q1Gd9b5Ub7iwKP/R6p3PQXQ4mXT7qdEIuJovQ= =g9ae -----END PGP SIGNATURE----- --3cvpddJPLVi4sHvP3w9GB7dlEdgTSik23--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?53F6167D.2030303>