OpenBSD Journal
Home : : Add Story : : Archives : : About : : Create Account : : Login :
W^X now mandatory in OpenBSD
Contributed by tj on Fri May 27 22:27:14 2016 (GMT)
from the x-chromosome dept.

Traditional Unix has allowed memory to be mapped W | X. Everyone now knows that’s a bad practice from a security standpoint, but the software ecosystem hasn't made much progress in this area. Theo de Raadt has just committed a change to begin blocking W^X violations in OpenBSD.

CVSROOT:	/cvs
Module name:	src
Changes by:	deraadt@cvs.openbsd.org	2016/05/27 13:45:04

Modified files:
	lib/libc/sys   : mmap.2 mount.2 mprotect.2 
	sbin/mount     : mntopts.h mount.8 mount.c 
	sbin/mount_ffs : mount_ffs.c 
	sbin/mount_nfs : mount_nfs.c 
	sys/kern       : kern_sysctl.c vfs_syscalls.c 
	sys/sys        : mount.h sysctl.h 
	sys/uvm        : uvm_mmap.c 
	usr.sbin/pstat : pstat.c 

Log message:
W^X violations are no longer permitted by default.  A kernel log message
is generated, and mprotect/mmap return ENOTSUP.  If the sysctl(8) flag
kern.wxabort is set then a SIGABRT occurs instead, for gdb use or coredump
creation.

W^X violating programs can be permitted on a ffs/nfs filesystem-basis,
using the "wxallowed" mount option.  One day far in the future
upstream software developers will understand that W^X violations are a
tremendously risky practice and that style of programming will be
banished outright.  Until then, we recommend most users need to use the
wxallowed option on their /usr/local filesystem.  At least your other
filesystems don't permit such programs.

Read more...
[topicsecurity]
[ 17 comments 3:02 ago ] (flat) (expanded)

Privilege Separation and Pledge (video)
Contributed by tj on Wed May 25 13:34:54 2016 (GMT)
from the feathered-edges dept.

This year's dotSecurity conference featured a presentation from OpenBSD founder Theo de Raadt, titled "Privilege Separation and Pledge."

The video is now available here, in addition to the slides.

[topicconf]
[ 3 comments 14:48 ago ] (flat) (expanded)

p2k16 Hackathon Report: pirofti@ on octeon and TPM
Contributed by tj on Thu May 19 11:27:55 2016 (GMT)
from the resume-hacking dept.

The next hackathon report comes from Paul Irofti, who writes:

This was probably the shortest hackathon I attended. The 4 days flew by and I realised we have to pack and go with nothing to show for.

My usual hackathon work flow is: waste 3-4 days trying to figure how some device works, and then polish the driver(s) for the remaining days while congratulating myself with coffee, Günther and beer.

Read more...
[topichardware]
[ 1 comment 7d13:39 ago ] (flat) (expanded)

p2k16 Hackathon Report: jasper@ on gnome, puppet and more
Contributed by tj on Tue May 17 12:37:04 2016 (GMT)
from the elastic-beats dept.

Our next report comes from Jasper Lievisse Adriaanse, who writes:

Hackathons have long since had two themes for me, gnomes and puppets. However this hackathon I actually didn't want to play with puppets for once, yet I ended up importing Puppet 4 after all. More on that later.

Read more...
[topicports]
[ 0 comments ] (flat) (expanded)

SROP mitigation committed
Contributed by tj on Thu May 12 03:28:12 2016 (GMT)
from the his-name-was-sigurd dept.

In a recent email, Theo de Raadt explains the SROP mitigation technique, a recent team effort.

This is the first demonstration of a mitigation against SROP.

Utilizing a trick from kbind(2), the kernel now only accepts signal returns from the PC address of the sigreturn(2) syscall in the signal trampoline. Since the signal trampoline page is randomized placed per process, it is only known by directly returning from a signal handler.

As well, the sigcontext provided to sigreturn(2) now contains a magic cookie constructed from a per-process cookie XOR'd against the address of the signal context. That part is similar to the LWN discussion mentioned above. I came to the same conclusion semi-independently as a result of Antoine's ports builds, which identified all the parts of the application software ecosystem I had to study. Woe is me!

Read more...
[topicsecurity]
[ 3 comments 15:07 ago ] (flat) (expanded)

p2k16 Hackathon Report: krw@ on pdisk, softraid and more
Contributed by tj on Wed May 11 16:31:49 2016 (GMT)
from the chasing-squirrels dept.

The next hackathon report comes from Ken Westerback, who writes:

I arrived at CDG, got on my train and arrived in Nantes just before a national train strike started. Whew. Did a pleasant walk paralleling the tram tracks to the appropriate tram stop and consulted the documentation. "Hackroom is nearby." Hmmm. Wandered around for a while without stumbling across it, and finally noticed the large neon sign for the hotel. From which I *did* have directions. Got to the hackroom building and found that the doors had been locked early. A few frantic texts later I got in and the normal hackathon routine took hold.

Read more...
[topicopenbsd]
[ 1 comment 14d5:22 ago ] (flat) (expanded)

p2k16 Hackathon Report: ajacoutot@ on Gnome, rc and rcctl improvements
Contributed by nayden on Sun May 8 14:09:20 2016 (GMT)
from the rc to the controls dept.

Our next p2k16 report comes from Antoine Jacoutot, who writes:

First of all I'd like to give a big thank to gilles@, Epitech Nantes and the OpenBSD Foundation for making this event a real blast. The hackroom accomodation was very nice and so was the location.

Disclaimer: I have a goldfish memory so I am probably forgetting a lot of small things I did during this week, next time I should probably start writing what I'm doing as I go.

Read more...
[topicopenbsd]
[ 2 comments 18d1:51 ago ] (flat) (expanded)

p2k16 Hackathon Report: naddy@ on graphics libs progress (yes, packages!)
Contributed by pitrh on Tue May 3 16:07:45 2016 (GMT)
from the unkinking graphics dept.

Fresh from the p2k16 hackathon comes this report from Christian Weisgerber, who writes:

Coming to p2k16, I had only vague plans what to work on. The last few hackathons I had tackled some projects that didn't quite result into something committable, so this time I decided to keep it basic. The idea was to update some ports and maybe make a dent in the use of the obsolete libiconv and gettext modules.

Read more...
[topicopenbsd]
[ 1 comment 24d13:45 ago ] (flat) (expanded)

p2k16 Hackathon Report: landry@ on mozilla ports
Contributed by tj on Tue May 3 18:49:51 2016 (GMT)
from the mozillian-things-to-do dept.

The next report in our p2k16 series is from Landry Breuil, who writes:

For once we had a hackathon in France, so travel should be simple... turns out, at the last minute the past week i had engaged myself in a motorbike rally race, taking place in Corsica on the weekend right before the hackathon. Driving to south of france on Thursday, night boat to corsica, two days racing, then boat back to the mainland, then driving all night to come back to my place, change backpack, sleep 1h, and hop on the cheap bus from my place to Nantes. Arrived there at 21h, i was of course totally destroyed from the 30h trip and after meeting the others for a heavy meal, i crashed early to bed...

Read more...
[topicports]
[ 6 comments 13d4:44 ago ] (flat) (expanded)

Support OpenBSD!

Donate to OpenBSD

Buy OpenBSD products

Features

We are constantly on the lookout for stories of how you put OpenBSD to work. Please submit any informative articles on how OpenBSD is helping your company.

Older Stuff
Tuesday, May 03
15:28 libcrypto errata - May 2016 (12)
15:35 OpenBSD Foundation Announces Gold Sponsor (2)
Monday, May 02
13:42 p2k16 Hackathon Report: tb@ on documentation, ports, wireless (2)
Saturday, April 30
23:06 p2k16 Hackathon Report: espie@ on proot (0)
16:32 proot: dpb meets chroot (1)
Monday, April 25
14:59 anti-ROP mechanism in libc (26)
14:23 The p2k16 hackathon has begun (2)
Monday, April 11
20:11 Undeadly and HTTPS (36)
Friday, April 08
09:20 CfP EuroBSDCon 2016 (7)

Older Stuff...
Yesterday's Edition...

OpenBSD Errata
[xml]

OpenBSD Resources

XML/RSS/RDF
Users wishing RSS/RDF summary files of OpenBSD Journal, can retrieve: [xml]


[ Home | Add Story | Archives | Polls | About ]

Copyright © 2004-2008 Daniel Hartmeier. All rights reserved. Articles and comments are copyright their respective authors, submission implies license to publish on this web site. Contents of the archive prior to April 2nd 2004 as well as images and HTML templates were copied from the fabulous original deadly.org with Jose's and Jim's kind permission. Some icons from slashdot.org used with permission from Kathleen. This journal runs as CGI with httpd(8) on OpenBSD, the source code is BSD licensed. Search engine is ht://Dig. undeadly \Un*dead"ly\, a. Not subject to death; immortal. [Obs.]