[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

PIE, updated SSP/ProPolice GCC & user-select specs file patches from Hardened Debian inclusion



Hi,

I've never contacted to this list mainly because i didn't have time to
do it properly, so, i'm doing it now ;-)

First i want to ask for the inclusion of an updated revision of the
Stack Smashing Protector/ProPolice that would be more stable than the
current one.[1]

Second, i would ask for inclusion of the Position Independent
Executables (PIE) patch that will make us able to use, for example, the
PaX ASLR features.[1]

It's overload is minimal AFAIK, most in amd64 and also on i386 it has
non-heavy user-side effects, i mean, it's overload does not make it
unreliable when thinking in the advantages that it gives to us.

As a third (possible) patch, the one that makes GCC able to use an
user-provided specs file, which its location is read from an environment
variable (useful for wrappers [2]).


These patches are already available on the Hardened Debian repositories,
and also tested in different scenarios (in addition, also running on
production environments without losing performance).

I would be happy hearing back from you and how do you think that this
should be handled.

[1]:http://cvs.debian-hardened.org/cgi-bin/viewcvs/debian-hardened/system-dh/x86/sarge/devel/gcc/3.3.4-6/
[2]: hardened-gcc is a wrapper that sets transparently some variables in
order to know which implementations of SSP [3], if there's PIE or ET_DYN
and son, and compile (transparently) the binaries without using
non-existant flags or simply for using it on systems that have different
implementations or structures (also on archs that haven't available some
of the hardened debian GCC features).It's not finished by now, but you
can reach it on
http://cvs.debian-hardened.org/cgi-bin/viewcvs/debian-hardened/hardened-dev-utils/.
[3]: http://wiki.debian-hardened.org/SSP/ProPolice_Implementations


Cheers,
-- 
Lorenzo Hernandez Garcia-Hierro <lorenzo@gnu.org>
Hardened Debian head/chief developer - http://www.debian-hardened.org

Attachment: signature.asc
Description: Esta parte del mensaje =?ISO-8859-1?Q?est=E1?= firmada digitalmente


Reply to: