Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 27 May 2015 20:00:02 -0400
From:      Shawn Webb <shawn.webb@hardenedbsd.org>
To:        Warner Losh <imp@bsdimp.com>
Cc:        Pedro Giffuni <pfg@freebsd.org>, Alfred Perlstein <alfred@freebsd.org>, freebsd-arch@freebsd.org
Subject:   Re: ASLR work into -HEAD ?
Message-ID:  <2503264.OAH5YVL1Fd@shawnwebb-laptop>
In-Reply-To: <F01F2D02-33E5-4E37-ACE3-D6CFA9E814A3@bsdimp.com>
References:  <555CADB6.202@FreeBSD.org> <1432743944.20023.12.camel@hardenedbsd.org> <F01F2D02-33E5-4E37-ACE3-D6CFA9E814A3@bsdimp.com>

next in thread | previous in thread | raw e-mail | index | archive | help

[-- Attachment #1 --]
On Wednesday, 27 May 2015 17:37:06 Warner Losh wrote:
> > On May 27, 2015, at 10:25 AM, Shawn Webb <shawn.webb@hardenedbsd.org>
> > wrote: Good. I'd rather focus on code rather than pointless politics.
> 
> But then…
> 
> > Our patch is more complex due to per-jail support and the various
> > weaknesses FreeBSD wanted us to add. HardenedBSD's implementation does
> > not contain those weaknesses.
> 
> You’ll get more flies with honey than vinegar.
> 
> And FreeBSD didn’t want you to do anything. Certain people wanted certain
> features or changes. Perhaps you could be more specific, since this kind of
> carping is totally unhelpful.

At the FreeBSD Developer Summit at EuroBSDCon 2014, Ed Maste said on behalf of 
the FreeBSD Foundation that he (and by extension, the Foundation) would block 
the ASLR patch from being merged into HEAD if we didn't provide a mechanism 
for disabling ASLR as a non-root user on a per-binary basis.

I begrudgingly committed a first draft of the API on 26 Sep 2014 to our 
upstreaming branch[1]. Further changes were made to clean up the 
implementation a bit within a few days. This rather silly "feature" was 
included in the next patch update to the review on Phabricator.

This, of course, is a vast weakness that can be easily abused. So we've made 
sure not to have this in HardenedBSD. Want to debug an application with ASLR 
turned off? Set the sysctl to turn it off. Or use secadm to disable ASLR for 
that application. Usage of secadm requires root privileges and works on a per-
jail basis, just like our sysctls that control ASLR.

[1]: 
https://github.com/HardenedBSD/hardenedBSD/commit/0e6726c5606c9055951bea44ff4a6fca8a79329c

-- 
Shawn Webb
HardenedBSD

GPG Key ID:                0x6A84658F52456EEE
GPG Key Fingerprint: 2ABA B6BD EF6A F486 BE89  3D9E 6A84 658F 5245 6EEE
[-- Attachment #2 --]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQIcBAABCAAGBQJVZlqCAAoJEGqEZY9SRW7uwVgQAI3iSdcGoBDtM5/jJprmE/4X
418ZvraBM2frn2osFLZQAnh2xthAGg+04Q7g7jBaUpRfSX6GMK+1xOnejSFuPYEI
bONVJ0fCXM3h5pPkV/vx1E4HP1CCduR/AlG+11Rb3y6llAezFm0ym6ZvKxTftVqn
u3m6xTd05oXYRJ1k4DcjvpRWaImF9snZ+3DZPoHAIUgve5050rcF7rijFz2IK0Zq
gVJ3GWCyOJbLUKgbBIthpp8Qb8GaFRD8nsok6GXh+PjHtJFIsTGXp9uw1z5+30A7
utp6HzqguM8yDNEanYH+oaCOKy7qvefDMD0pocYvdS72C8zBcMcLalezAEMa6ig7
+gYKWhc2075qkk0OtQHvmYrSI66NFC+TdTvIx4y30egDi79wdPWuu80lQBoHSXxf
WKaBZSjzAD35lDCAWJ9+yRC3Fb2wYK5fE9MmWpceLjmIrHdfgiMjgPf46n7lGEtP
Fg5V/203XJ8QLu1octwOJu66DXyDFPI+gSAg5bR4G54cd/q0MbXXJlayMosx1AMv
SwQBrpmUvCPl8z7re/0VIFZ1shuSqqxaItetfuRi5wPuCxat9AVHr6DCacFnF3O6
JaaXOQhy4evcOozJaxkHgM/8E1posqWouOXWvsBHOqTfapTa+KWn9scogKp5caYR
vdOD5rNCepJWDguhHsUc
=to4U
-----END PGP SIGNATURE-----

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?2503264.OAH5YVL1Fd>