Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S261305AbTEBShY (ORCPT ); Fri, 2 May 2003 14:37:24 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S263079AbTEBShY (ORCPT ); Fri, 2 May 2003 14:37:24 -0400 Received: from x35.xmailserver.org ([208.129.208.51]:47006 "EHLO x35.xmailserver.org") by vger.kernel.org with ESMTP id S261305AbTEBShX (ORCPT ); Fri, 2 May 2003 14:37:23 -0400 X-AuthUser: davidel@xmailserver.org Date: Fri, 2 May 2003 11:50:42 -0700 (PDT) From: Davide Libenzi X-X-Sender: davide@blue1.dev.mcafeelabs.com To: Florian Weimer cc: Linux Kernel Mailing List Subject: Re: [Announcement] "Exec Shield", new Linux security feature In-Reply-To: <87fznx42to.fsf@deneb.enyo.de> Message-ID: References: <87llxp43ii.fsf@deneb.enyo.de> <87fznx42to.fsf@deneb.enyo.de> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1371 Lines: 40 On Fri, 2 May 2003, Florian Weimer wrote: > Davide Libenzi writes: > > > On Fri, 2 May 2003, Florian Weimer wrote: > > > >> Davide Libenzi writes: > >> > >> > Ingo, do you want protection against shell code injection ? Have the > >> > kernel to assign random stack addresses to processes and they won't be > >> > able to guess the stack pointer to place the jump. > >> > >> If your software is broken enough to have buffer overflow bugs, it's > >> not entirely unlikely that it leaks the stack address as well (IIRC, > >> BIND 8 did). > > > > Leaking the stack address is not a problem in this case, since the next > > run will be very->very->very likely different. > > Usually, you can't afford a fork() and execve() for each request you > process. 8-( You just do it once in your main() task and one for each thread. It's not so bad. Only thing is a ( tunable ) waste of stack space. > (In addition, GCC might optimize away those alloca() calls.) Luckily enough it doesn't. I checked this a long time ago since I had the same fear due the builtin_alloca. - Davide - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/