|
Message-ID: <20120812182218.GA3799@openwall.com> Date: Sun, 12 Aug 2012 22:22:18 +0400 From: Solar Designer <solar@...nwall.com> To: owl-dev@...ts.openwall.com Subject: Re: segoon's report #16 Vasily, On Sun, Aug 12, 2012 at 10:16:20PM +0400, Vasily Kulikov wrote: > Accomplishments: > - rebased Owl patch to RHEL 6.3'ish kernel, which now includes HARDEN_SHM. > - backported from upstream protected_{symlinks,hardlinks} (implemented in > upstream by Kees as LSM). > - forwardported HARDEN_FIFO as /proc/sys/fs/protected_fifos (was missing > in Kees' patch). > - added log spoofing protection. > - backported kref overflow protection configurable via > /proc/sys/kernel/kref_overflow_action, a light version of > PAX_REFCOUNT. > - backported a bugfix to RHEL's kernel, it ignored mount options on mount(2) > for procfs (was OK only on -o remount,...). > - implemented configure time sysfs umask and gid setting. > - wrote test programs for all ported security features. > - identified that gcc's stack protector doesn't work with Owl's old glibc. > - moved kernel modules to /lib/modules/2.6.32-xxx/ from /lib/modules/2.6.32/. > Now it's possible to install several 2.6.32 kernels in a single system. This is very nice. Where's the updated patch? Can you post it in here for now? > TODO > - set sysfs umask/gid for container by vzctl. Is this needed, and why? Do we have similar functionality for procfs or whatever? > - implement PAX_USERCOPY. > - document everything. OK. Thanks, Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.