Re: gcc support to stack-smashing attacks protection

2006-06-30 Thread João Salvatti

Thanks folks

.

On 6/29/06, Joachim Schipper [EMAIL PROTECTED] wrote:

On Thu, Jun 29, 2006 at 04:48:24PM -0300, Jo?o Salvatti wrote:
 Hi all...

 I'd like to know if OpenBSD's gcc build binary files with built-in
 stack-smashing attacks protection.

As Theo pointed out, yes.

Be aware that there are still plenty of problems that can occur with
less-than-perfectly written code; plus, in many cases only the program
logic needs to be exploited (XSS and SQL injection are prime examples of
this, as are most symlink attacks).

Joachim





--
Joco Salvatti
Undergraduating in Computer Science
Federal University of Para - UFPA
web: http://www.openbsd-pa.org
e-mail: [EMAIL PROTECTED]



gcc support to stack-smashing attacks protection

2006-06-29 Thread João Salvatti

Hi all...

I'd like to know if OpenBSD's gcc build binary files with built-in
stack-smashing attacks protection.

Thanks.


--
Joco Salvatti
Undergraduating in Computer Science
Federal University of Para - UFPA
web: http://www.openbsd-pa.org
e-mail: [EMAIL PROTECTED]



Re: gcc support to stack-smashing attacks protection

2006-06-29 Thread Theo de Raadt
 I'd like to know if OpenBSD's gcc build binary files with built-in
 stack-smashing attacks protection.

Of course.  We were the first to incorporate this stuff.



Re: gcc support to stack-smashing attacks protection

2006-06-29 Thread Dunceor
On 6/29/06, Joco Salvatti [EMAIL PROTECTED] wrote:

 Hi all...

 I'd like to know if OpenBSD's gcc build binary files with built-in
 stack-smashing attacks protection.

 Thanks.


 --
 Joco Salvatti
 Undergraduating in Computer Science
 Federal University of Para - UFPA
 web: http://www.openbsd-pa.org
 e-mail: [EMAIL PROTECTED]

 Quote:

New Technologies

As we audit source code, we often invent new ways of solving problems.
Sometimes these ideas have been used before in some random application
written somewhere, but perhaps not taken to the degree that we do.


   - strlcpy() and strlcat()
   - Memory protection purify
  - W^X
  - .rodata segment
  - Guard pages
  - Randomized malloc()
  - Randomized mmap()
  - atexit() and stdio protection
   - Privilege separation
   - Privilege revocation
   - Chroot jailing
   - New uids
   - ProPolice
   - ... and others

Read up on Propolice: http://www.trl.ibm.com/projects/security/ssp/

// dunceor



Re: gcc support to stack-smashing attacks protection

2006-06-29 Thread Joachim Schipper
On Thu, Jun 29, 2006 at 04:48:24PM -0300, Jo?o Salvatti wrote:
 Hi all...
 
 I'd like to know if OpenBSD's gcc build binary files with built-in
 stack-smashing attacks protection.

As Theo pointed out, yes.

Be aware that there are still plenty of problems that can occur with
less-than-perfectly written code; plus, in many cases only the program
logic needs to be exploited (XSS and SQL injection are prime examples of
this, as are most symlink attacks).

Joachim