TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Exploit Mitigation Techniques in OpenBSD (2005)

62 pointsby kerckeralmost 9 years ago

2 comments

nickpsecurityalmost 9 years ago
Of tactical approaches, the OpenBSD team has clearly done the best job. I still advocate fixing root causes or high-confidence mechanisms wherever possible. They merit praise for what they pull off on the other side of the fence with UNIX apps I&#x27;d have little confidence in protecting outside of costly, isolation architectures and obfuscation schemes.<p>This is my favorite, though, as it&#x27;s a high-assurance principle in action:<p>&quot;When you free() an object &gt;= pagesize, it gets unmapped using munmap(). Therefore, <i>access after free() becomes a detectable crash.</i>&quot;<p>That&#x27;s the fail-safe principle in action per Saltzer and Shroeder. Can&#x27;t stop every, potential failure in some area? Just make it crash hard, noticeably, and hopefully with enough detail to spot &amp; fix the problem. Another line of research in high-assurance CompSci is to, via hardware or software, taint the incoming data with optional profiles of system code that stops and details circumstances of any code injection. Always interesting stuff developing along these lines.<p>Far as Saltzer and Shroeder principles, I accidentally found this in Google that explains them with Star Wars scenarios. Pretty good.<p><a href="http:&#x2F;&#x2F;emergentchaos.com&#x2F;the-security-principles-of-saltzer-and-schroeder" rel="nofollow">http:&#x2F;&#x2F;emergentchaos.com&#x2F;the-security-principles-of-saltzer-...</a>
DennisPalmost 9 years ago
Have these techniques been incorporated into Linux since then?
评论 #11791603 未加载