Re: [arch-dev-public] Proposal: enabling full ASLR on x86_64 via hardening-wrapper

2014-12-31 Thread Daniel Micay
On 31/12/14 04:47 AM, Pierre Schmitz wrote: > Am 26.12.2014 01:56, schrieb Allan McRae: >> I am not in favour of using the hardening script because I don't find it >> adheres to what we consider KISS. Our build system is supposed to be >> simple and entirely transparent when looking at the PKGBUIL

Re: [arch-dev-public] Proposal: enabling full ASLR on x86_64 via hardening-wrapper

2014-12-31 Thread Pierre Schmitz
Am 26.12.2014 01:56, schrieb Allan McRae: I am not in favour of using the hardening script because I don't find it adheres to what we consider KISS. Our build system is supposed to be simple and entirely transparent when looking at the PKGBUILD and default makepkg.conf. Any user can run "abs

Re: [arch-dev-public] Proposal: enabling full ASLR on x86_64 via hardening-wrapper

2014-12-25 Thread Allan McRae
On 26/12/14 12:01, Daniel Micay wrote: > I'll continue waiting to see what happens with the GCC patches but I'm > not too optimistic about that. The reasoning behind the rejection of the > past bugs / patches was primarily that this should be handled in > autotools (ignoring that most projects don'

Re: [arch-dev-public] Proposal: enabling full ASLR on x86_64 via hardening-wrapper

2014-12-25 Thread Daniel Micay
On 25/12/14 07:56 PM, Allan McRae wrote: > > I'd guess it has a good change to be included in gcc-5.0. If it gets > committed I can backport immediately. > > I am not in favour of using the hardening script because I don't find it > adheres to what we consider KISS. I can understand that. It wo

Re: [arch-dev-public] Proposal: enabling full ASLR on x86_64 via hardening-wrapper

2014-12-25 Thread Allan McRae
On 19/12/14 09:31, Daniel Micay wrote: > The only real barrier to enabling it is the lack of support in GCC for > simply flipping it on by default. Library code is already built with -fPIC > and is then linked with -shared. Full ASLR requires building the executable > code with -fPIE (or -fPIC, whi

Re: [arch-dev-public] Proposal: enabling full ASLR on x86_64 via hardening-wrapper

2014-12-24 Thread Daniel Micay
> The problem is that it's important for anything doing networking, any > executable with setuid/setcap/setgid and anything run by users on > untrusted input like image viewers, text editors and tools like file and > strings. If `python` or `ruby` isn't PIE, then it's trivial to exploit > heap buff

Re: [arch-dev-public] Proposal: enabling full ASLR on x86_64 via hardening-wrapper

2014-12-24 Thread Bartłomiej Piotrowski
On Thu, 18 Dec 2014 18:31:57 -0500 Daniel Micay wrote: > Arch's single biggest security weakness is that it's not benefiting > from address space layout randomization (ASLR). Fixing this issue > would be a major step towards being a leader in this area. Many > distributions enable ASLR, stack prot

Re: [arch-dev-public] Proposal: enabling full ASLR on x86_64 via hardening-wrapper

2014-12-21 Thread Daniel Micay
On 21/12/14 06:44 PM, Allan McRae wrote: > On 22/12/14 06:53, Daniel Micay wrote: > > Yet we have already rebuilt ALL packages since adding this default.The > static libraries left have no shared coutnerpart. Ah, I forgot that there was a rebuild for that already. They'd just need to be rebuilt ag

Re: [arch-dev-public] Proposal: enabling full ASLR on x86_64 via hardening-wrapper

2014-12-21 Thread Allan McRae
On 22/12/14 06:53, Daniel Micay wrote: > One more thing to note about this is that we'd need to do a rebuild of > the remaining 186 packages with static libraries. In many cases, those > libraries will probably just vanish thanks to the !staticlibs default. Yet we have already rebuilt ALL packages

Re: [arch-dev-public] Proposal: enabling full ASLR on x86_64 via hardening-wrapper

2014-12-21 Thread Daniel Micay
One more thing to note about this is that we'd need to do a rebuild of the remaining 186 packages with static libraries. In many cases, those libraries will probably just vanish thanks to the !staticlibs default. Static libraries aren't currently built as position independent unless they're meant

Re: [arch-dev-public] Proposal: enabling full ASLR on x86_64 via hardening-wrapper

2014-12-21 Thread Daniel Micay
On 21/12/14 04:51 AM, Lukas Jirkovsky wrote: > Hello Daniel, > thank you for the detailed explanation. > >> The address of dynamic libraries, the stack and the heap (both sbrk and >> the mmap base) is already randomized today so the backtrace is already >> going to include randomized addresses for

Re: [arch-dev-public] Proposal: enabling full ASLR on x86_64 via hardening-wrapper

2014-12-21 Thread Lukas Jirkovsky
Hello Daniel, thank you for the detailed explanation. > The address of dynamic libraries, the stack and the heap (both sbrk and > the mmap base) is already randomized today so the backtrace is already > going to include randomized addresses for anything defined in a library. Sure, but knowing at

Re: [arch-dev-public] Proposal: enabling full ASLR on x86_64 via hardening-wrapper

2014-12-19 Thread Daniel Micay
On 19/12/14 03:50 AM, Lukas Jirkovsky wrote: > > No matter how much I like the idea of making Arch more secure, there > is one thing that makes compiling the whole system with ASLR one big > no-go for me (please correct me if I'm wrong). As far as I know, the > ASLR makes core dumps completely usel

Re: [arch-dev-public] Proposal: enabling full ASLR on x86_64 via hardening-wrapper

2014-12-19 Thread Lukas Jirkovsky
On 19 December 2014 at 00:31, Daniel Micay wrote: > Arch's single biggest security weakness is that it's not benefiting from > address space layout randomization (ASLR). Fixing this issue would be a > major step towards being a leader in this area. Many distributions enable > ASLR, stack protector

[arch-dev-public] Proposal: enabling full ASLR on x86_64 via hardening-wrapper

2014-12-18 Thread Daniel Micay
Arch's single biggest security weakness is that it's not benefiting from address space layout randomization (ASLR). Fixing this issue would be a major step towards being a leader in this area. Many distributions enable ASLR, stack protector, etc. for a chosen set of "security critical" stuff but ve