Add the ASLR report

Approved by:	hrs (mentor, blanket)
This commit is contained in:
Benjamin Kaduk 2014-10-11 01:53:30 +00:00
parent a92e76dc1b
commit ee2a12c6a3
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/head/; revision=45786

View file

@ -2096,4 +2096,94 @@
</task>
</help>
</project>
<project cat='proj'>
<title>Address Space Layout Randomization (ASLR)</title>
<contact>
<person>
<name>
<given>Shawn</given>
<common>Webb</common>
</name>
<email>shawn.webb@hardenedbsd.org</email>
</person>
<person>
<name>
<given>Oliver</given>
<common>Pinter</common>
</name>
<email>oliver.pinter@hardenedbsd.org</email>
</person>
</contact>
<links>
<url href="http://hardenedbsd.org/">The HardenedBSD Project</url>
<url href="https://reviews.freebsd.org/D473">ASLR review
on Phabricator</url>
<url href="https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=193940">
EXP-RUN test results</url>
<url href="https://wiki.freebsd.org/201409DevSummit/ASLR">EuroBSDCon
2014 Devsummit page on ASLR</url>
<url href="https://wiki.freebsd.org/AddressSpaceLayoutRandomization">
FreeBSD wiki page on ASLR</url>
</links>
<body>
<p>Address Space Layout Randomization (ASLR) is a computer
security technique that aids in mitigating low-level
vulnerabilities such as buffer overflows. In order to
prevent an attacker from knowing where a given
exploitable vulnerability lies in memory, ASLR randomizes
the memory layout of running applications.</p>
<p>FreeBSD lacks behind the industry in exploit mitigation
technologies. ASLR is a great first step in implementing
such technologies. Future exploit mitigation technologies
will rely on ASLR.</p>
<p>A lot has happened in the last few months. Shawn Webb gave
presentations at both BSDCan 2014 and EuroBSDCon 2014. The
presentations were met with a lot of support and backing.
At the end of EuroBSDCon, an awesome developer named Ilya
Bakulin fixed our ARM bug. Shawn Webb and Oliver Pinter
have submitted our patch to Phabricator, FreeBSD's new
code review utility. Shawn Webb added an API for allowing
a debugger to disable ASLR in order to support
deterministic debugging with applications such as lldb or
gdb. Oliver Pinter enhanced the performance of our ASLR
implementation. A package building exp-run was ran and came
out favorably in terms of performance. Shawn Webb bumped up
the maximum number of bits allowed to be randomized to 20
and set the default to 14.</p>
<p>To aid in the upstreaming process of the ASLR project and
other security-related projects, Shan Webb and Oliver Pinter
founded The HardenedBSD project. It exists primarily to
serve as a staging area for bleeding-edge development of
security-related projects for FreeBSD prior to being merged
upstream.</p>
</body>
<sponsor>SoldierX</sponsor>
<help>
<task>
<p>Get more people testing and reviewing our patch</p>
</task>
<task>
<p>Run more performance tests</p>
</task>
<task>
<p>Figure out why the two ports failed in the EXP-RUN.
Involve the port maintainers.</p>
</task>
<task>
<p>Test on different architectures (we need help with this)</p>
</task>
</help>
</project>
</report>