|
Message-ID: <20120812181620.GA32205@albatros> Date: Sun, 12 Aug 2012 22:16:20 +0400 From: Vasily Kulikov <segoon@...nwall.com> To: owl-dev@...ts.openwall.com Subject: segoon's report #16 Hi, Accomplishments: - rebased Owl patch to RHEL 6.3'ish kernel, which now includes HARDEN_SHM. - backported from upstream protected_{symlinks,hardlinks} (implemented in upstream by Kees as LSM). - forwardported HARDEN_FIFO as /proc/sys/fs/protected_fifos (was missing in Kees' patch). - added log spoofing protection. - backported kref overflow protection configurable via /proc/sys/kernel/kref_overflow_action, a light version of PAX_REFCOUNT. - backported a bugfix to RHEL's kernel, it ignored mount options on mount(2) for procfs (was OK only on -o remount,...). - implemented configure time sysfs umask and gid setting. - wrote test programs for all ported security features. - identified that gcc's stack protector doesn't work with Owl's old glibc. - moved kernel modules to /lib/modules/2.6.32-xxx/ from /lib/modules/2.6.32/. Now it's possible to install several 2.6.32 kernels in a single system. TODO - set sysfs umask/gid for container by vzctl. - implement PAX_USERCOPY. - document everything. Thanks, -- Vasily
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.