I'm not sure if anyone has tried this one, but a fairly extensive patch set
for the 2.4 series of kernels is available called grsecurity
(http://www.grsecurity.net). It includes whole whacks of stuff (take a look
at the "features" page http://www.grsecurity.net/features.htm) .. I haven't
had a change to tried it out, but it looks promising.

If anyone has any good/bad experiences with such patches, please let me
know.

later,
Steve

> -----Original Message-----
> From: Alvin Oga [mailto:[EMAIL PROTECTED]] 
> Sent: January 18, 2002 12:30 PM
> To: Vincent
> Cc: [EMAIL PROTECTED]
> Subject: Re: protection against buffer overflows
> 
> 
> 
> hi ya vincent
>  
> > I'm working on buffer overflows these days, and more precisely the 
> > possible methods to avoid them. It seems that the most used 
> tools to 
> > prevent exploits based on buffer overflows are Libsafe, OpenWall, 
> > StackGuard... and maybe Saint Jude.
> > 
> > Has anyone any interesting comments about theses methods ?
> > 
> 
> just a quickie comment... 
> 
> libsafe seems to work across the board on most major linux distro
> and takes 5 minutes to do it all
>       http://www.Linux-Sec.net/harden/libsafe.uhow2.txt
> 
> openwall works only w/ 2.2.x kernels unless they've released 
> 2.4.x stuff
> 
> stackguard was beyond my scope of "patience"...
>       ( part of immunix ?? )
>       - and it modifies gcc  which i didnt like it doing...
> 
>       - sometimes compiling sources already fails with generic
>       environments so didnt want to deal with a modified gcc
> 
> other kernel patches/methodologies
>       http://www.Linux-Sec.net/Harden/kernel.gwif.html
> 
> thanx
> alvin
> 
> 
> -- 
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact 
> [EMAIL PROTECTED]
> 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to