Re: gcc support to stack-smashing attacks protection
Thanks folks . On 6/29/06, Joachim Schipper [EMAIL PROTECTED] wrote: On Thu, Jun 29, 2006 at 04:48:24PM -0300, Jo?o Salvatti wrote: Hi all... I'd like to know if OpenBSD's gcc build binary files with built-in stack-smashing attacks protection. As Theo pointed out, yes. Be aware that there are still plenty of problems that can occur with less-than-perfectly written code; plus, in many cases only the program logic needs to be exploited (XSS and SQL injection are prime examples of this, as are most symlink attacks). Joachim -- Joco Salvatti Undergraduating in Computer Science Federal University of Para - UFPA web: http://www.openbsd-pa.org e-mail: [EMAIL PROTECTED]
gcc support to stack-smashing attacks protection
Hi all... I'd like to know if OpenBSD's gcc build binary files with built-in stack-smashing attacks protection. Thanks. -- Joco Salvatti Undergraduating in Computer Science Federal University of Para - UFPA web: http://www.openbsd-pa.org e-mail: [EMAIL PROTECTED]
Re: gcc support to stack-smashing attacks protection
I'd like to know if OpenBSD's gcc build binary files with built-in stack-smashing attacks protection. Of course. We were the first to incorporate this stuff.
Re: gcc support to stack-smashing attacks protection
On 6/29/06, Joco Salvatti [EMAIL PROTECTED] wrote: Hi all... I'd like to know if OpenBSD's gcc build binary files with built-in stack-smashing attacks protection. Thanks. -- Joco Salvatti Undergraduating in Computer Science Federal University of Para - UFPA web: http://www.openbsd-pa.org e-mail: [EMAIL PROTECTED] Quote: New Technologies As we audit source code, we often invent new ways of solving problems. Sometimes these ideas have been used before in some random application written somewhere, but perhaps not taken to the degree that we do. - strlcpy() and strlcat() - Memory protection purify - W^X - .rodata segment - Guard pages - Randomized malloc() - Randomized mmap() - atexit() and stdio protection - Privilege separation - Privilege revocation - Chroot jailing - New uids - ProPolice - ... and others Read up on Propolice: http://www.trl.ibm.com/projects/security/ssp/ // dunceor
Re: gcc support to stack-smashing attacks protection
On Thu, Jun 29, 2006 at 04:48:24PM -0300, Jo?o Salvatti wrote: Hi all... I'd like to know if OpenBSD's gcc build binary files with built-in stack-smashing attacks protection. As Theo pointed out, yes. Be aware that there are still plenty of problems that can occur with less-than-perfectly written code; plus, in many cases only the program logic needs to be exploited (XSS and SQL injection are prime examples of this, as are most symlink attacks). Joachim