Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <564B7757.6080100@gmail.com>
Date: Tue, 17 Nov 2015 13:52:07 -0500
From: Daniel Micay <danielmicay@...il.com>
To: oss-security@...ts.openwall.com
Subject: Re: Re: Fwd: x86 ROP mitigation

Is that really the right approach vs. preventing hijacking of flow
control via return pointers and function pointers? It doesn't really
seem like there's an end game in mind where it actually prevents ROP
rather than just removing many useful gadgets. Making useful ROP gadgets
harder to find doesn't mean much, since tools are used to find them and
the tools can be improved if it becomes necessary.

i.e. why not just go with something like PaX's RAP

(things like CPI/SafeStack could work too, but SafeStack requires
hardware support that's not available on x86_64 and ARM yet)

Preventing ROP by preventing hijacking of flow control in the first
place isn't as good as outright preventing memory corruption (i.e. the
bugs are still exploitable in many cases) but at least it wipes out a
form of exploitation entirely and forces techniques that are not always
going to accomplish everything that's desired. Chipping away at gadgets
doesn't do that unless they're entirely gone, and it's hard to see how
that could happen without higher performance costs than simply doing
full memory safety (not like ASAN, but rather with GC).


Download attachment "signature.asc" of type "application/pgp-signature" (820 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.