Hi everyone,

I'm working towards forcing a consistency in how we pax mark our
binaries.  The RFC for the design is at

http://git.overlays.gentoo.org/gitweb/?p=proj/elfix.git;a=blob;f=doc/paxctl-ng-design.txt;h=9de06a0f9f1c426a7e129b7da53cc43760cd3976;hb=128c1408ba8db6be3f9ade3dc1420a3bf0cee0a0

I am trying to force consistency between two (and in the future, three)
ways of doing pax markings, EI_PAX (flags are in the elf header), PT_PAX
(flags are in an elf program header) and a new design we're working on,
putting the flags in an Extended Filesystem attribute.  Each has
advantages and disadvantages, and all three will have to be employed to
cover the cases where the others don't work, so a utility which
consistently marks all three is useful.

There are two stages, the userland utility and kernel patching.  The
kernel patching is effectively done as long as you choose any of the
gentoo predefined profiles:

Security options  --->
    Grsecurity  --->
       Security Level --->
           Hardened Gentoo [server]
          or Hardened Gentoo [workstation]
          or Hardened Gentoo [virtualization]

The userland utility is callec paxctl-ng and its part of the
sys-apps/elfix-0.2.0 package which is currently masked pending testing.
 That's where you come in.  Please test the utility on binaries which
require pax marking and let me know if it works.  Of particular interest
are self checking binaries (like skype) which don't have a PT_PAX
section and would break if one were added.

Current the only known issue with paxctl-ng is that it doesn't properly
do file globbing.  I have not yet seen it break a binary, but please
don't use this on a production system until we have more confidence in it.

Thanks.

-- 
Anthony G. Basile, Ph.D.
Gentoo Linux Developer [Hardened]
E-Mail    : bluen...@gentoo.org
GnuPG FP  : 8040 5A4D 8709 21B1 1A88  33CE 979C AF40 D045 5535
GnuPG ID  : D0455535

Reply via email to