> I read "hacking blind." Can you restart a daemon with another forked
> process that's only job is to monitor a pipe or a waitpid()-like operation
> and if the parent dies, it exec's to restart it, or even execs "rcctl
> restart ntpd"
> 
> If the mitigations are successful at limiting execution to let's say,
> overwriting a canary that gets completely rerandomized with a fork-exec,
> instead of just a fork, it would stop a meaningful search for the correct
> canary to just blind luck instead of byte by byte discovery.

your position is very roughly: that paper lays out the absolute limit
of what someone could learn from broken software, so as long as we run
a new copy of the broken software we'll be safe........

obviously, no downside.

you say "completely rerandomized" -- uhm no, only a tiny fraction of
the program execution environment and runtime are randomized, in
particular same registers used everywhere, same instruction sequences,
same frame layouts, same register and stack leave-behinds, same
relative offsets inside each DSO....

nothing learned from re-running buggy software?  sorry, that is BS.

Reply via email to