Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 14 Jul 2015 17:15:41 +0000 (UTC)
From:      Warren Block <wblock@FreeBSD.org>
To:        doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org
Subject:   svn commit: r46975 - head/en_US.ISO8859-1/htdocs/news/status
Message-ID:  <201507141715.t6EHFfeK019260@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: wblock
Date: Tue Jul 14 17:15:40 2015
New Revision: 46975
URL: https://svnweb.freebsd.org/changeset/doc/46975

Log:
  Add Shawn Webb <shawn.webb@hardenedbsd.org>'s ASLR report.

Modified:
  head/en_US.ISO8859-1/htdocs/news/status/report-2015-04-2015-06.xml

Modified: head/en_US.ISO8859-1/htdocs/news/status/report-2015-04-2015-06.xml
==============================================================================
--- head/en_US.ISO8859-1/htdocs/news/status/report-2015-04-2015-06.xml	Tue Jul 14 16:18:23 2015	(r46974)
+++ head/en_US.ISO8859-1/htdocs/news/status/report-2015-04-2015-06.xml	Tue Jul 14 17:15:40 2015	(r46975)
@@ -1356,4 +1356,119 @@
       </task>
     </help>
   </project>
+
+  <project cat='proj'>
+    <title>Address Space Layout Randomization (ASLR)</title>
+
+    <contact>
+      <person>
+	<name>
+	  <given>Shawn</given>
+	  <common>Webb</common>
+	</name>
+	<email>shawn.webb@hardenedbsd.org</email>
+      </person>
+
+      <person>
+	<name>
+	  <given>Oliver</given>
+	  <common>Pinter</common>
+	</name>
+	<email>oliver.pinter@hardenedbsd.org</email>
+      </person>
+
+      <person>
+	<name>HardenedBSD</name>
+	<email>core@hardenedbsd.org</email>
+      </person>
+    </contact>
+
+    <links>
+      <url href="https://hardenedbsd.org/">HardenedBSD</url>;
+      <url href="https://hardenedbsd.org/article/shawn-webb/2015-06-30/introducing-true-stack-randomization">True Stack Randomization</url>
+      <url href="https://hardenedbsd.org/article/shawn-webb/2015-07-06/announcing-aslr-completion">Announcing ASLR Completion</url>
+      <url href="https://hardenedbsd.org/article/shawn-webb/2015-07-11/call-donations">Call for Donations</url>
+      <url href="https://www.soldierx.com/">SoldierX</url>;
+    </links>
+
+    <body>
+      <p>HardenedBSD is a downstream distribution of &os; aimed at
+	implementing exploit mitigation and security technologies.
+	The HardenedBSD development team has focused on several key
+	features, one being Address Space Layout Randomization (ASLR).
+	ASLR is a computer security technique that aids in mitigating
+	low-level vulnerabilities such as buffer overflows.  ASLR
+	randomizes the memory layout of running applications to
+	prevent an attacker from knowing where a given vulnerability
+	lies in memory.</p>
+
+      <p>This last quarter, the HardenedBSD team has finalized the
+	core implementation of ASLR.  We implemented true stack
+	randomization along with a random stack gap.  This change
+	allows us to apply 42 bits of entropy to the stack, the
+	highest of any operating system.  We bumped the
+	<tt>hardening.pax.aslr.stack_len</tt> <tt>sysctl(8)</tt> to 42
+	by default on amd64.</p>
+
+      <p>We also now randomize the Virtual Dynamic Shared Object
+	(VDSO).  The VDSO is one or more pages of memory shared
+	between the kernel and the userland.  On amd64, it contains
+	the signal trampoline and timing code
+	(<tt>gettimeofday(4)</tt>, for example).</p>
+
+      <p>With these two changes, the ASLR implementation is now
+	complete.  There are still tasks to work on, however.  We need
+	to update our documentation and enhance a few pieces of code.
+	Our ASLR implementation is in use in production by HardenedBSD
+	and is performing robustly.</p>
+
+      <p>Additionally, we are currently running a fundraiser to help
+	us establish a not-for-profit organization and for hardware
+	updates.  We have received a lot of help from the community
+	and we greatly appreciate the help.  We need further help
+	to take the project to the next level.  We look forward to
+	working with the &os; project in providing excellent
+	security.</p>
+    </body>
+
+    <sponsor>
+      SoldierX
+    </sponsor>
+
+    <help>
+      <task>
+	<p>Update the <tt>aslr(4)</tt> manpage and the wiki
+	page.</p>
+      </task>
+
+      <task>
+	<p>Improve the Shared Object load order feature with Michael
+	  Zandi's improvements.</p>
+      </task>
+
+      <task>
+	<p>Re-port the ASLR work to vanilla &os;.  Include the
+	  custom work requested by &os; developers.</p>
+      </task>
+
+      <task>
+	<p>Close the existing review on Phabricator.</p>
+      </task>
+
+      <task>
+	<p>Open multiple smaller reviews for pieces of the ASLR
+	  patch that can be split out logically.</p>
+      </task>
+
+      <task>
+	<p>Perform a special backport to HardenedBSD 10-STABLE for
+	  OPNSense to pull in.</p>
+      </task>
+
+      <task>
+	<p><tt>golang</tt> segfaults in HardenedBSD.  Help would be
+	  nice in debugging.</p>
+      </task>
+    </help>
+  </project>
 </report>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201507141715.t6EHFfeK019260>