public inbox for gentoo-security@lists.gentoo.org
 help / color / mirror / Atom feed
* [gentoo-security] Stack smash protected daemons
@ 2004-09-22 15:54 John Richard Moser
  2004-09-22 18:46 ` Tobias Klausmann
                   ` (3 more replies)
  0 siblings, 4 replies; 19+ messages in thread
From: John Richard Moser @ 2004-09-22 15:54 UTC (permalink / raw
  To: gentoo-security, gentoo-dev

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

It may be prudent to use extra protection on certain ebuilds in standard
Gentoo profiles where the changes would be significant in the case of a
security fault in the program.  Such programs as daemons and chmod()+s
programs would be major targets for this sort of thing.

The most immediately apparent route to take would be to have ebuilds
such as openssh, apache, and su stack smash protected.  This would
prevent common buffer overflow attacks from being used to compromise
security; such attacks would only cause the program attacked to abort,
which could still be used as a Denial of Service attack, but would not
allow successful intrusion.

Gentoo ships gcc with stack smash protection built in.  This is
activated by -fstack-protector or -fstack-protector-all.  It would be
feasible to add one of these flags to an ebuild based on a FEATURES or
USE setting.

I believe it would be a good idea to have such a FEATURES or USE flag on
by default in all profiles where SSP is supported.  In this manner, the
major targets of security attacks would automatically be protected;
while still allowing the user to disable the protection if the user
desires.  Users wanting more protection can simply add -fstack-protector
to CFLAGS, or use Hardened Gentoo.

Any comments?  Would this be more suitable as a USE or a FEATURES setting?

- --
All content of all messages exchanged herein are left in the
Public Domain, unless otherwise explicitly stated.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFBUaBOhDd4aOud5P8RAv/sAKCGx+cy5D3U35jDvGEFV5fcInF2fwCfbvGM
QvF8iaV8fuNFVQcintwy+2o=
=4Gdc
-----END PGP SIGNATURE-----

--
gentoo-security@gentoo.org mailing list


^ permalink raw reply	[flat|nested] 19+ messages in thread

end of thread, other threads:[~2004-09-26 18:40 UTC | newest]

Thread overview: 19+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2004-09-22 15:54 [gentoo-security] Stack smash protected daemons John Richard Moser
2004-09-22 18:46 ` Tobias Klausmann
2004-09-22 23:49 ` [gentoo-security] Re: [gentoo-dev] " Ned Ludd
2004-09-23  3:00   ` Miguel Filipe
2004-09-23  4:01 ` John Richard Moser
2004-09-23  4:06   ` John Richard Moser
2004-09-23  4:20   ` [gentoo-security] OT: " JHolder
2004-09-23  4:22     ` John Richard Moser
2004-09-23  4:47       ` JHolder
2004-09-23  5:31         ` John Richard Moser
2004-09-23 15:37     ` BarrySchwartz124
2004-09-23  5:26   ` [gentoo-security] " Ned Ludd
2004-09-23  8:31     ` [gentoo-security] " Thierry Carrez
2004-09-23 14:05       ` Thierry Carrez
2004-09-24  3:21         ` [gentoo-security] Re: [gentoo-dev] " John Richard Moser
2004-09-24  6:02           ` Ned Ludd
2004-09-24  6:34             ` John Richard Moser
2004-09-23 17:27       ` [gentoo-security] " John Richard Moser
2004-09-26 18:39 ` [gentoo-security] Re: [gentoo-dev] " John Richard Moser

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox