Hi all,

after reading the recent CORE advisory about the mbuf handling bug, I was wondering if some of OpenBSD's exploit mitigation strategies could also be applied to the kernel in order to prevent exploitation of kernel bugs. Theo's presentation about exploit mitigation ( http://openbsd.org/papers/ven05-deraadt/index.html ) mentions Stackgap, ProPolice/SSP, W^X/NX bit, ld.so randomization, randomized malloc, .rodata segment, StackGhost (on Sparc/Sparc64), privilege revocation/separation, which all seem to have been introduced in order to protect buggy userland code from being exploited (please correct me if I'm wrong).

Are there any known techniques for also protecting kernel code, which could be implemented in OpenBSD, i.e., would it be technically feasible (or would it make any sense) to implement some address randomization to a kernel image after it has been initially loaded into memory? Does W^X also apply to kernel code, i.e., could it be applied in order to prevent maliciously introduced code from execution inside the kernel? In other words: is a bug-free kernel the only way to eventually render a system secure against such attacks? And if this is so, does this mean that microkernel designs are in fact inherently more secure than monolithic kernels, because they allow for a better reduction of the attack surface which can't be achieved with alternative strategies? In other words: regarding security, is Prof. Tanenbaum actually right with his preference for microkernels in his books about operating systems?

I'm aware that my questions must look quite silly to you kernel developers, but I am wondering about these things for quite some time now -- it would be great if someone could shed some light on this, or just point me to some relevant literature.

regards,
Andreas

Reply via email to