Non-executable stack
Patrick Bihan-Faou
patrick.bihan-faou at netzuno.com
Fri Oct 28 00:09:47 PDT 2005
db wrote:
> On Thursday 27 October 2005 19:58, you wrote:
>
>>> Ok thanks, but I was looking for a kernel level patch. Btw which ports
>>> will break?
>>>
>> I did not keep a list, but as far as I remember, the 'pure-pw' binary
>> from pure-ftpd was the last thing that failed. Because it was not
>> visible in first place (the port builded fine), I decided the risk of
>> breaking things without noticing it was not worth it.
>>
>
> Ok, I was planing on using pure-ftpd.
>
>
>> I don't mean that it's a bad thing, but it will cost you some time to
>> find the bugs, report the bugs and get them fixed. And if you are
>> willing to use it in a production environment, you have to fully test
>> the software eacht time you are upgrading to be sure things will not
>> break. It's also not officially supported as far as I know.
>>
>
> I'm not a kernel hacker and only have access to ia32, so I can't help develop
> or test it, but I hope someone with the right skills and means also think
> it's about time we give the admins and users the option of a non-executable
> stack (and heap). If I can help in any way I will. Maybe my next computer
> will be an AMD64, I think it must be the cheapest of the platforms with
> hardware support for execute and read permission distinction on memory?
>
We are using the stack protection patches for GCC in production servers
running FreeBSD 4.11 and everything runs well. We are using a fairly
large number of ports (from samba to php to postgresql, etc.) and none
have shown issues with this feature.
Note that since it is a compiler and library patch, the kernel also
benefits from it. I would say that if a port misbehaves with this, then
it is more likely a problem with the port.
I can't comment on how it work in FreeBSD 5 or 6, but in FreeBSD 4.11 it
rocks.
Patrick.
More information about the freebsd-security
mailing list