On 8/22/05, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote:
> i think having a flag you could set to disable the new
> behavior would be a good idea. it may very well be that what i
> suggest is not doable due to the low-level nature of the
> functions in question. just a thought.

To complement the previous arguments against adding more knobs,
toggles, switches and crap:

"Security only works if the secure way is also the easy way." Notice
that every production security technology openbsd includes a) is easy
to use and b) is on by default. OpenSSH, privsep, strong random
numbers, strong crypto... you have to try weaken your system.

As others have said, other security technologies have failed/are
failing/ are not properly used because they're a) hard to use properly
and b) easy to not use. I'll admit it: I'm lazy. Once upon a time a
port that I used was broken by an openbsd security technology. I was
too lazy to track down the breakage, so I uninstalled the port and
went with pretty similar functionality in the base system.

Once upon a time there was a program that I used that was unreliable.
It crashed, hung, busy waited, etc. for no good reason. I crashed it
on openbsd a few times, found the bugs, and reported them (with
patches) to the author. Now it's stable.

As Theo and others will no doubt tell you the right thing to do is fix
the buggy program, rather than running a provably buggy program with
significant memory management issues. Now did you notice how Theo said
that the new mmap, guard pages, and other things stomp on errors as
small as a single byte. Remember that ssh bug? That was a one byte
overflow. Explain to us why turning off the security systems to keep a
buggy program from being terminated is a good thing?

CK

-- 
GDB has a 'break' feature; why doesn't it have 'fix' too?

Reply via email to