Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 12 Apr 2015 20:22:16 +0000 (UTC)
From:      Benjamin Kaduk <bjk@FreeBSD.org>
To:        doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org
Subject:   svn commit: r46518 - head/en_US.ISO8859-1/htdocs/news/status
Message-ID:  <201504122022.t3CKMGoi094224@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: bjk
Date: Sun Apr 12 20:22:15 2015
New Revision: 46518
URL: https://svnweb.freebsd.org/changeset/doc/46518

Log:
  Add the ASLR report
  
  Approved by:	hrs (mentor, implicit)

Modified:
  head/en_US.ISO8859-1/htdocs/news/status/report-2015-01-2015-03.xml

Modified: head/en_US.ISO8859-1/htdocs/news/status/report-2015-01-2015-03.xml
==============================================================================
--- head/en_US.ISO8859-1/htdocs/news/status/report-2015-01-2015-03.xml	Sun Apr 12 00:06:59 2015	(r46517)
+++ head/en_US.ISO8859-1/htdocs/news/status/report-2015-01-2015-03.xml	Sun Apr 12 20:22:15 2015	(r46518)
@@ -83,4 +83,71 @@
     <description>Miscellaneous</description>
   </category>
 
+  <project cat='kern'>
+    <title>Address Space Layout Randomization (ASLR)</title>
+
+    <contact>
+      <person>
+	<name>
+	  <given>Shawn</given>
+	  <common>Webb</common>
+	</name>
+	<email>shawn.webb@hardenedbsd.org</email>
+      </person>
+      <person>
+	<name>
+	  <given>Oliver</given>
+	  <common>Pinter</common>
+	</name>
+	<email>oliver.pinter@hardenedbsd.org</email>
+      </person>
+    </contact>
+
+    <links>
+      <url href="https://hardenedbsd.org/">HardenedBSD</url>;
+      <url href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054669.html">ASLR Call For Testing</url>
+      <url href="https://reviews.freebsd.org/D473">FreeBSD Code Review of ASLR</url>
+    </links>
+
+    <body>
+      <p>Address Space Layout Randomization (ASLR) is a
+	computer security technique that aids in mitigating
+	low-level vulnerabilities such as buffer overflows.
+	ASLR randomizes the memory layout of running
+	applications to prevent an attacker from knowing where
+	a given exploitable vulnerability lies in memory.</p>
+
+      <p>We have been working hard the last few months to ensure
+	the robustness of our ASLR implementation. We have
+	written a helpful manpage. We have updated the patch on
+	FreeBSD's code review system (Phabricator).  Our ASLR
+	implementation is in heavy use by the HardenedBSD team
+	in production environments and is performing
+	robustly.</p>
+
+      <p>The next task is to compile the base system applications as
+	Position-Independent Executables (PIEs). In order for
+	ASLR to be effective, applications must be compiled as
+	PIEs. It is likely that this part will take a long time
+	to accomplish, given the complexity surrounding
+	building the libraries in the base system. Even if applications
+	are not compiled as PIEs, having ASLR available still
+	helps those applications (like HardenedBSD's secadm)
+	which force compilation as PIE for themselves.</p>
+    </body>
+
+    <sponsor>SoldierX</sponsor>
+
+    <help>
+      <task>
+	<p>Test our patch against 11-CURRENT.</p>
+      </task>
+
+      <task>
+	<p>For &os; committers: work with us to get this merged
+	  into &os;.</p>
+      </task>
+    </help>
+  </project>
+
 </report>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201504122022.t3CKMGoi094224>