1 |
> In terms of userland, non hardened profile doesn't protect you at all |
2 |
> against buffer overflows, you are removing one important security |
3 |
> layer. SSP protects you against buffer overflows in terms that the |
4 |
> vulnerable application gets killed when the canary is modified before |
5 |
> the execution of the arbitrary code. PIE protects you against return |
6 |
> into libc attacks that doesn't need an executable stack. PaX is not |
7 |
> perfect and needs them as complementary solutions. For example I think |
8 |
> that RANDEXEC was removed from PaX time ago, one buffer overflow that |
9 |
> uses return into libc attack could be succesfully against one |
10 |
> non-hardened binary. Since skype is a network oriented software... |
11 |
|
12 |
In what situations is a hardened kernel useful? |
13 |
|
14 |
- Grant |
15 |
|
16 |
|
17 |
>>> Hardened profiles: Yes there's a difference, no you should not switch to |
18 |
>>> hardened/linux/${ARCH} at this time. |
19 |
>> |
20 |
>> Is hardened/x86/2.6 still available for new installations? My other |
21 |
>> systems are amd64 but none of them list hardened/amd64/2.6. |
22 |
>> |
23 |
>>> You can get skype working by downloading or building gcc 4.1.x and pointing |
24 |
>>> LD_LIBRARY_PATH at the shared object directory when starting skype. skype |
25 |
>>> won't be using hardened toolchain but since its closed source and you're |
26 |
>>> willing to switch the whole machine to non-hardened I figure you probably |
27 |
>>> don't mind. ;) |
28 |
>>> |
29 |
>>> Example: |
30 |
>>> 1. Download |
31 |
>>> http://tinderbox.dev.gentoo.org/default-linux/x86/sys-devel/gcc-4.1.2.tbz2 |
32 |
>>> 2. unpack the archive to ${HOME}/tinderbox-pkgs/sys-devel/gcc/ |
33 |
>>> 3. Run it: |
34 |
>>> LD_LIBRARY_PATH="${HOME}/tinderbox-pkgs/sys-devel/gcc/usr/lib/gcc/i686-pc-linux-gnu/4.1.2/" |
35 |
>>> skype |
36 |
>>> |
37 |
>>> If you only require VoIP capability and not skype specifically you might be |
38 |
>>> interested net-im/ekiga. |
39 |
>> |
40 |
>> Thank you very much for that, but I'm trying to simplify. You see, |
41 |
>> I'm only a fake sysadmin. Does using a hardened kernel with a |
42 |
>> non-hardened profile still offer good protection? |
43 |
>> |
44 |
>> - Grant |
45 |
>> |
46 |
>>>> > I've been able to do so; basically I switched over to the standard |
47 |
>>>> > profile, disabled selinux in the kernel, and re-emerged system for new |
48 |
>>>> > use flags. There were some other details but overall the process was |
49 |
>>>> > pretty painless, anyone ambitious enough to configure a hardened system |
50 |
>>>> > can probably handle the switch without much problem. Not that I'm |
51 |
>>>> > encouraging you to drop hardened (especially on a laptop that could be |
52 |
>>>> > exposed to random wifi networks ;-) |
53 |
>>>> |
54 |
>>>> Is there any difference between 1 and 8 here? Should I switch to 8? |
55 |
>>>> |
56 |
>>>> # eselect profile list |
57 |
>>>> Available profile symlink targets: |
58 |
>>>> [1] hardened/x86/2.6 * |
59 |
>>>> [2] selinux/2007.0/x86 |
60 |
>>>> [3] selinux/2007.0/x86/hardened |
61 |
>>>> [4] default/linux/x86/2008.0 |
62 |
>>>> [5] default/linux/x86/2008.0/desktop |
63 |
>>>> [6] default/linux/x86/2008.0/developer |
64 |
>>>> [7] default/linux/x86/2008.0/server |
65 |
>>>> [8] hardened/linux/x86 |
66 |
>>>> |
67 |
>>>> - Grant |
68 |
>>>> |
69 |
>>>> >> Can I switch my laptop's profile from a hardened one to a non-hardened |
70 |
>>>> >> one? I thought this was impossible without a complete reinstall but |
71 |
>>>> >> folks on the gentoo-user list seem to think it's not a problem. |
72 |
>>>> >> |
73 |
>>>> >> - Grant |