From: Ned Ludd <solar@gentoo.org>
To: John Richard Moser <nigelenki@comcast.net>
Cc: Thierry Carrez <koon@gentoo.org>,
gentoo-dev@lists.gentoo.org, gentoo-security@lists.gentoo.org
Subject: Re: [gentoo-dev] Re: Stack smash protected daemons
Date: Fri, 24 Sep 2004 02:02:00 -0400 [thread overview]
Message-ID: <1096005720.12931.107.camel@simple> (raw)
In-Reply-To: <415392BD.1010905@comcast.net>
[-- Attachment #1: Type: text/plain, Size: 3536 bytes --]
dammit are we over complicating this?
You guys seem to be hung up on silly USE/FEATURE flag names.
How about we as Ciaran McCreesh proposed just add it to CFLAGS by
default and deploy stages in such a manner.
Solves everything for most cases and leave the option up to the user to
disable if he/she wants to.
On Thu, 2004-09-23 at 23:21, John Richard Moser wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> I'm probably repeting myself here . . .heh.
>
> Thierry Carrez wrote:
> | Thierry Carrez wrote:
> |
> |
> |>Restricting ssp to daemons and +s programs is not very
> |>useful.
> |
> |
> | Clarifying this :
> |
> | SSP is very useful, and it should be used on all executables on a given
> | machine. I don't think we should only use it to protect daemons and SUID
> | programs, since a lot of buffer overflows are discovered in client
> | software and they are also a way of remotely compromising a machine. If
> | you protect only exposed services, attackers will turn to passive
> | attacks, like virus images, to always exploit the weakest link.
> |
>
> How about, make.conf default and make.conf.example:
>
> #
> # The "auto-nossp" USE flag will disable -fstack-protector on ebuilds
> # that take a significant hit from SSP and aren't a major security
> # threat. Ebuilds that break with SSP will have SSP disabled in all
> # cases anyway.
> #USE="X"
> ...
> #
> # For added security, the -fstack-protector flag can be added to prevent
> # buffer overflow based attacks. -fno-stack-protector will disable this
> # universally; nothing forces it on.
> #
> # Decent examples:
> #CFLAGS="-march=i686 -O2 -pipe -fstack-protector"
> #CFLAGS="-mcpu=pentium4 -O3 -pipe -fstack-protector"
>
>
> This solution may have extra perks. As you said, more than just daemon
> software is affected. Rather than tracking it all down, perhaps simply
> looking for not-always-great-for-SSP things such as gcc (can you attack
> gcc anyway? No really, I want to know) and have a USE flag disable SSP
> for them.
>
> Another reason for this route would be that using -fno-stack-protector
> in CFLAGS would be overriden by builds explicitely enabling
> - -fstack-protector. Using -fstack-protector in CFLAGS would be overriden
> by ebuilds explicitely setting -fno-stack-protector. The logical
> consequences of each (i.e. when -fstack would and wouldn't be applied
> based on combinations of the user and portage enabling/disabling it) in
> my eyes seem better with this approach.
>
> It all depends on if you want fine control of programs which have SSP,
> or fine control of programs which don't have SSP. This solution would
> be the latter, and I think it makes more sense than the original
> proposal; a wider spread usage of SSP is probably the only way to ensure
> the best protection.
>
> Comments?
>
> | -K
> |
> | --
> | gentoo-dev@gentoo.org mailing list
> |
> |
>
> - --
> All content of all messages exchanged herein are left in the
> Public Domain, unless otherwise explicitly stated.
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.2.6 (GNU/Linux)
> Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
>
> iD8DBQFBU5K8hDd4aOud5P8RAo08AJ4xNx6IkHDjDhQX43sfKNiNJmz10wCfbrM7
> eI5ZweX0wl8uG7l0vH3Z+YI=
> =C/8F
> -----END PGP SIGNATURE-----
>
> --
> gentoo-dev@gentoo.org mailing list
--
Ned Ludd <solar@gentoo.org>
Gentoo (hardened,security,infrastructure,embedded,toolchain) Developer
[-- Attachment #2: This is a digitally signed message part --]
[-- Type: application/pgp-signature, Size: 189 bytes --]
next prev parent reply other threads:[~2004-09-24 6:02 UTC|newest]
Thread overview: 98+ messages / expand[flat|nested] mbox.gz Atom feed top
2004-09-22 15:54 [gentoo-dev] Stack smash protected daemons John Richard Moser
2004-09-22 16:04 ` Ciaran McCreesh
2004-09-22 17:06 ` Elfyn McBratney
2004-09-22 17:30 ` Marius Mauch
2004-09-22 21:13 ` John Richard Moser
2004-09-23 0:11 ` Ned Ludd
2004-09-23 0:27 ` Ciaran McCreesh
2004-09-23 0:38 ` Mike Frysinger
2004-09-23 0:42 ` Ciaran McCreesh
2004-09-23 2:40 ` Mike Frysinger
2004-09-23 14:47 ` Marius Mauch
2004-09-23 19:03 ` Mike Frysinger
2004-09-23 20:28 ` Ned Ludd
2004-09-23 20:35 ` Ciaran McCreesh
2004-09-23 20:53 ` Ned Ludd
2004-09-23 21:11 ` Ciaran McCreesh
2004-09-23 1:40 ` John Richard Moser
2004-09-23 1:55 ` Ciaran McCreesh
2004-09-23 2:24 ` John Richard Moser
2004-09-23 1:48 ` Dave Monnier
2004-09-23 2:03 ` Ned Ludd
2004-09-23 2:08 ` Ciaran McCreesh
2004-09-23 2:25 ` John Richard Moser
2004-09-23 2:34 ` Ned Ludd
2004-09-23 3:12 ` Mike Frysinger
2004-09-23 2:41 ` Colin Kingsley
2004-09-23 2:47 ` Mike Frysinger
2004-09-23 23:29 ` Daniel Goller
2004-09-24 0:28 ` Jason Stubbs
2004-09-25 16:32 ` Bart Lauwers
2004-09-23 1:41 ` Christian Birchinger
2004-09-23 23:27 ` Daniel Goller
2004-09-23 23:27 ` Ciaran McCreesh
2004-09-22 16:48 ` Rumen Yotov
2004-09-22 17:59 ` Lance Albertson
2004-09-22 21:35 ` John Richard Moser
2004-09-22 21:53 ` Mike Frysinger
2004-09-22 23:49 ` Ned Ludd
2004-09-22 23:17 ` Donnie Berkholz
2004-09-23 0:26 ` Mike Frysinger
2004-09-23 0:37 ` Marius Mauch
2004-09-23 1:51 ` John Richard Moser
2004-09-23 2:44 ` Mike Frysinger
2004-09-23 14:55 ` Marius Mauch
2004-09-23 20:10 ` Paul de Vrieze
2004-09-24 0:41 ` Jason Stubbs
2004-09-24 0:46 ` Jason Stubbs
2004-09-24 0:52 ` John Richard Moser
2004-09-24 1:55 ` Marius Mauch
2004-09-23 4:01 ` John Richard Moser
2004-09-23 4:06 ` John Richard Moser
2004-09-23 5:26 ` Ned Ludd
2004-09-23 5:32 ` Mike Frysinger
2004-09-23 8:31 ` [gentoo-dev] " Thierry Carrez
2004-09-23 14:05 ` Thierry Carrez
2004-09-23 16:27 ` Ciaran McCreesh
2004-09-23 17:45 ` John Richard Moser
2004-09-24 3:21 ` John Richard Moser
2004-09-24 6:02 ` Ned Ludd [this message]
2004-09-24 6:34 ` Colin Kingsley
2004-09-24 6:34 ` John Richard Moser
2004-09-24 7:23 ` Colin Kingsley
2004-09-24 11:41 ` Ciaran McCreesh
2004-09-24 12:42 ` Spider
2004-09-24 13:03 ` Colin Kingsley
2004-09-24 13:10 ` Ciaran McCreesh
2004-09-24 15:48 ` John Richard Moser
2004-09-24 19:00 ` Paul de Vrieze
2004-09-25 1:19 ` [gentoo-dev] " Duncan
2004-09-25 3:04 ` John Richard Moser
2004-09-25 10:55 ` [gentoo-dev] " Duncan
2004-09-23 17:27 ` [gentoo-dev] Re: [gentoo-security] " John Richard Moser
2004-09-25 17:26 ` [gentoo-dev] " Bart Lauwers
2004-09-25 17:35 ` Ciaran McCreesh
2004-09-25 21:42 ` Bart Lauwers
2004-09-25 22:29 ` Ciaran McCreesh
2004-09-25 23:46 ` Bart Lauwers
2004-09-25 23:54 ` Ciaran McCreesh
2004-09-27 8:02 ` Thierry Carrez
2004-09-26 0:18 ` Stephen P. Becker
2004-09-26 1:22 ` Jason Stubbs
2004-09-25 17:43 ` Rumen Yotov
2004-09-26 0:58 ` Jason Wever
2004-09-26 6:14 ` John Richard Moser
2004-09-26 13:04 ` Ciaran McCreesh
2004-09-26 16:22 ` John Richard Moser
2004-09-26 16:23 ` Ciaran McCreesh
2004-09-26 15:52 ` Stephen P. Becker
2004-09-26 16:18 ` John Richard Moser
2004-09-26 16:22 ` Ciaran McCreesh
2004-09-26 16:29 ` Stephen P. Becker
2004-09-26 16:11 ` Jason Wever
2004-09-26 16:41 ` John Richard Moser
2004-09-26 17:25 ` [gentoo-dev] Stack smash protected daemons [blah] Kumba
2004-09-26 6:39 ` [gentoo-dev] Stack smash protected daemons Rumen Yotov
2004-09-26 10:14 ` Colin Kingsley
2004-09-26 18:36 ` Jon Portnoy
2004-09-26 18:39 ` John Richard Moser
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1096005720.12931.107.camel@simple \
--to=solar@gentoo.org \
--cc=gentoo-dev@lists.gentoo.org \
--cc=gentoo-security@lists.gentoo.org \
--cc=koon@gentoo.org \
--cc=nigelenki@comcast.net \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox