TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

HardenedBSD: Feature comparison vs other BSD distros

86 pointsby stargravealmost 7 years ago

12 comments

nickpsecurityalmost 7 years ago
The list is mostly the kind of tactical mitigations that get bypassed a lot by private individuals and academia. Clever people write one, clever people break one, rinse, repeat. The untested theory is that they would be really hard or impossible to bypass in combination. The kind of people that could test that have mostly been smashing things like Chrome or mobiles where there&#x27;s enough users to justify their efforts in terms of fame, money, etc. The real mitigation here is obfuscation of using a platform hardly anyone uses that is also harder than average to target. Then, there&#x27;s some benefits to the security measures used on top of it. Obfuscation is main reason attacks aren&#x27;t attempted much, though.<p>A better list would start with design techniques and assurance activities that led to systems with few to no vulnerabilities during pentests by well-funded, knowledgeable attackers. That&#x27;s on top of what survives in the field with lots of attention. In the 80&#x27;s-90&#x27;s, those techniques included precise specifications of behavior or security policy, ways of proving&#x2F;testing that in the code, hierarchical layering with simple coding to facilitate analysis, small kernels with most code deprivileged, memory-safe languages where possible, verification that object code matches source w&#x2F; no compiler errors&#x2F;subversions, partitioning GUI&#x27;s&#x2F;filesystems&#x2F;networking limiting apps effects on each other, covert channel analysis of entire system, secure repo&#x27;s containing these artifacts w&#x2F; secure transfer to users, and option to re-run the analyses or rebuild the kernel themselves for independent replication.<p>Each of these techniques found or prevented many vulnerabilities in systems they were applied to. They even became mandatory requirements under the first, security certification: the TCSEC. Trusted Xenix in 1990 used some of them for that reason. Unlike often-bypassed mitigations, each of these methods still work today. Some work even better due to tooling improvements. The BSD&#x27;s are largely ignoring these methods to maintain legacy compatibility with insecure architecture, unsafe code, and configuration scripts that can be just as risky. Unsurprising given early attempts at applying strong methods to UNIX, like UCLA Secure UNIX, showed the UNIX design had covert channels and such built in. You couldn&#x27;t fully secure a UNIX without breaking legacy compatibility in lots of ways on top of a significant performance hit from memory safety and context switching. Led high-security projects to just virtualize UNIX&#x2F;Linux on top of secure, isolation kernel. Projects that are attempting to follow some of these lessons in low-privilege architecture or language use include GenodeOS, Muen separation kernel, seL4, JX OS, and ExpressOS for mobile. EROS was an interesting older one that added persistence on top of capability-based kernel.<p>I figure someone should mention the methods that stopped NSA&#x27;s hackers in various evaluations since they&#x27;re strangely not on the list.
评论 #17381532 未加载
tachionalmost 7 years ago
I would advise taking any claims from HardenedBSD about HardenerBSD with a huge grain of salt. The main code author behind HBSD has a history of his patches to FreeBSD being rejected due to very poor implementation, coding errors, poor quality and not understanding OS and security features design and reasoning and not accepting their reviews and not listening to his peers. He is however very good at getting himself and HBSD a lot of PR attention for bold security claims, but has a very poor record when it comes to quality code.<p>This list is also not very accurate either: his ASLR patches to FreeBSD were rejected due to quality issues, then they were applied to HBSD. The lack of mark for base sandboxing is another one, where FreeBSD had Capsicum sandbox available for few years now and a lot of base is now Capsicum sandboxed, with more and more coming with every release. I could go on here, but that should give you the picture.<p>Take this advice with grain of salt as well - I&#x27;m a FreeBSD developer, so I might be biased.
评论 #17382622 未加载
TheAceOfHeartsalmost 7 years ago
I&#x27;ve never heard of HardenedBSD before. I thought OpenBSD was generally considered the best choice for serious security, but I&#x27;d be interesting in reading up more on how they compare. As someone that&#x27;s not an expert on the subject, it would help to get some extra info that explains why certain features are useful for improving security.<p>It&#x27;s not clear that all these features impact real-world security, but maybe I&#x27;m just inexperienced and naive. For example, OpenBSD has &quot;Most of base sandboxed&quot;, which seems like a huge deal to me. Knowing how many security issues we&#x27;ve seen in the last 10 to 20 years relating to each feature would help in understanding their impact a lot more.<p>Some immediate questions that popped up from clicking through their pages: Who uses this OS? There&#x27;s a few company links, but I had a hard time figuring out what some of them even do. Maybe this is a really dumb question, but why FreeBSD over OpenBSD? Finally, are changes being upstreamed? Can we expect these improvements to eventually make it into FreeBSD?
评论 #17380909 未加载
评论 #17382751 未加载
sjwrightalmost 7 years ago
That comparison doesn&#x27;t seem to include OpenBSD&#x27;s biggest security feature, their track record of robust code review, eliminating countless security bugs before they&#x27;re ever exploited.
评论 #17381085 未加载
swillsalmost 7 years ago
I have wanted for a long time to see some quantification of these security features, i.e. &quot;What percentage of attacks does feature X prevent in the real world?&quot; and &quot;With all these features combined, how much longer can the OS survive attack vs without them?&quot;, but I don&#x27;t think I&#x27;ve ever seen it.
Paninoalmost 7 years ago
Random number generation, including arc4random() and &#x2F;dev&#x2F;*random:<p><pre><code> OpenBSD: ChaCha20 FreeBSD: RC4 NetBSD: NIST CTR_DRBG using AES-128 HardenedBSD: ? Dragonfly BSD: xor of outputs ChaCha20 and IBAA </code></pre> Also on OpenBSD, major 3rd party packages often come with security improvements. For example, nginx and Apache run chrooted, and Chrome is pledged.<p>I don&#x27;t have the time to analyze privsep in base among the BSDs, but I can say it&#x27;s extensive in OpenBSD.<p>I would love to see pledge support in HardenedBSD. I think they&#x27;re doing good work. Hopefully FreeBSD can import some of it.<p>Also, Dragonfly is a first-class BSD citizen and should be included in comparisons. As a recent example, the project leader, Matthew Dillon, has done excellent work relating to Speculative Execution and collaborated with other BSDs which helped everyone. Also I&#x27;m pretty sure OpenBSD has imported a number of hardware drivers from Dragonfly.
评论 #17382666 未加载
评论 #17382305 未加载
评论 #17382409 未加载
Ensorceledalmost 7 years ago
Kudos on a list where features HardenedBSD doesn&#x27;t have but others (OpenBSD) do are also listed.<p>Recently I&#x27;ve become accustomed to seeing overly tuned feature lists where the product in question has, apparently, all the things you could want.
评论 #17382018 未加载
effteealmost 7 years ago
HardenedBSD no longer uses LibreSSL, they switched back to OpenSSL in April.<p><a href="https:&#x2F;&#x2F;hardenedbsd.org&#x2F;article&#x2F;shawn-webb&#x2F;2018-04-30&#x2F;hardenedbsd-switching-back-openssl" rel="nofollow">https:&#x2F;&#x2F;hardenedbsd.org&#x2F;article&#x2F;shawn-webb&#x2F;2018-04-30&#x2F;harden...</a>
评论 #17382425 未加载
asveikaualmost 7 years ago
&gt; Restrictions on mprotect to prevent switching pages between writable and executable.<p>No JIT then?<p>I could see a locked down server process wanting to drop access to this, but I feel like it&#x27;s unreasonable to have on by default. (Also looking at you, Apple.)
评论 #17382675 未加载
评论 #17382543 未加载
ape4almost 7 years ago
No insult to the BSDs, but running a less popular OS can help too.
评论 #17381783 未加载
HugoDanielalmost 7 years ago
Hmm no DragonflyBSD
评论 #17383105 未加载
vermadenalmost 7 years ago
Some time ago I made an &#x27;introduction&#x27; to the HardenedBSD, you may find that useful.<p><a href="https:&#x2F;&#x2F;vermaden.wordpress.com&#x2F;2018&#x2F;04&#x2F;06&#x2F;introduction-to-hardenedbsd-world&#x2F;" rel="nofollow">https:&#x2F;&#x2F;vermaden.wordpress.com&#x2F;2018&#x2F;04&#x2F;06&#x2F;introduction-to-ha...</a>