I am not sure that you would need dcss's to protect one from arbitrarily
jumping into shared libraries (as may be used by exploits).  If one was to
design shared libraries such that each shared library has its own address
space then one could use cross memory to execute from that address space.
One could have a PC call for each shared library function, and as such
normal users would never be able to get to that code, other then by means of
the pc call, which executes a predetermined function.  This together with a
non executable stack will make things harder for any viruses.
I think that hardware funtionality, with os support is the best answer to
viruses, although it will probably never be 100% failsafe.

Jan Jaeger






From: Adam Thornton <[EMAIL PROTECTED]>
Reply-To: Linux on 390 Port <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: CPU Arch Security [was: Re: Probably the first published shell
code]
Date: Tue, 5 Nov 2002 16:01:57 -0500

On Tue, Nov 05, 2002 at 08:03:35PM +0000, Alan Cox wrote:
> Flavour of the year appears to be maths sign/overflow mishandling.
> Buffer overflows are no longer a growth area as programmers learn that
> one.

Gee, only took 'em, what, 40 years?

> > For this to catch on in the mainstream, other CPU architectures
> > would need to add similar features as well.  But given the recent
> > burbling from microsoft and intel about palladium and how cpu arch
> > changes can enhance security, (which intel seems to be actually
> > working on) I do not think that it is too wild, too early or too
> > impractical to engage in this task.
>
> I don't really see how fiddling with libraries helps you, but enlighten
> me

Well, one thing I can see exploiting under VM would be an agressive use
of DCSSes (or something like them--I don't know if you can put DCSSes in
other data spaces, and I don't think you can execute code from data
spaces, but you see where this is going), so you could share your shared
libraries between Linux images.  If each one were in its own read-only
address space, you'd get a vast reduction in overall memory footprint,
plus code couldn't exploit bugs in the standard libraries--even if you
have a buffer overflow (or whatever) vulnerability, a) the code is off
in its own private address space, so you can't go trash anything else,
and b) your virtual machine has that segment marked read-only anyway.

Good lord, I can't believe that I'm arguing for a segmented
architecture.

Adam

_________________________________________________________________
Chatten met je vrienden via het web? Probeer MSN Messenger
http://messenger.msn.nl/default.asp?client=1

Reply via email to