[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Executable stacks
- To: misc_(_at_)_openbsd_(_dot_)_org
- Subject: Re: Executable stacks
- From: ns_(_at_)_xf0rce_(_dot_)_dom_(_dot_)_de
- Date: Thu, 16 Dec 1999 17:47:44 +0100
- Cc: tschroed_(_at_)_acm_(_dot_)_org, weingart_(_at_)_natasha_(_dot_)_powersurfr_(_dot_)_com
dear openbsd fans,
i have followed the discussion on the misc openbsd mailinglist, webarchived
i am building hardened leenox servers using both stackguard (immunix.org)
and solar designers patches (ftp.openwall.com) for some time now and
considered switching to openbsd due to some strange conveniences in
glibc which makes use of the heavily abusable gcc trampolines.
i really still miss stack guarding techniques when it comes to openbsd.
stackguard (immunix.org) applies as long as gcc is being used.
2.6 (i have ordered the cds and some t-shirts being true soldier)
still uses gcc, so i am fine. but whats with 2.95 and so on using
egcs? no living person willing to talk to me knows about executable
stack issues when using egcs.
openbsd still has no kernel option to deactivate gcc trampolines,
what i really dislike and miss. :(
is anybody currently implementing such? i am willing to help you,
if you still need somebody.
does anybody have the same thoughts and/or needs?
ns at dom.de
Visit your host, monkey.org