Re: misc/187307: Security vulnerability with FreeBSD Jail

2014-03-06 Thread Shawn Webb
On Thu, Mar 6, 2014 at 1:55 AM, Jason Hellenthal wrote: > I would also add . . . separate ssh keys and passwords if the user needs > access to both host and jailed systems. This is just common practice and > not a security flaw by any means but an engineering oversight. > > Popsicle sticks also h

[CFT] ASLR, PIE, and segvguard on 11-current and 10-stable

2014-05-14 Thread Shawn Webb
patches/20140514091132-freebsd-stable-10-aslr-segvguard-SNAPSHOT.diff Thanks, Shawn Webb pgpZYdFhbir_V.pgp Description: PGP signature

Re: [CFT] ASLR, PIE, and segvguard on 11-current and 10-stable

2014-05-14 Thread Shawn Webb
for months. amd64 is rock solid from my experience. But your mileage may vary, hence the CFT. :-) Thanks, Shawn On May 14, 2014 10:02 AM -0700, Adrian Chadd wrote: > Hi! > > Cool! Does it run on MIPS? :P > > > -a > > > On 14 May 2014 06:58, Shawn Webb wrote: >

Re: [CFT] ASLR, PIE, and segvguard on 11-current and 10-stable

2014-05-23 Thread Shawn Webb
On May 23, 2014 07:53 PM +, Wojciech A. Koszek wrote: > On Wed, May 14, 2014 at 09:58:52AM -0400, Shawn Webb wrote: > > Hey All, > > > > [NOTE: crossposting between freebsd-current@, freebsd-security@, and > > freebsd-stable@. Please forgive me if c

New ASLR Patch

2014-09-05 Thread Shawn Webb
Hey All, I've submitted a new revision of our ASLR patch to Phabric. It can be applied to 11-CURRENT. The main changes include removal of the MAP_32BIT hack for amd64, a couple bug fixes, and stylistic changes requested by a few people. I'm looking for commentary and volunteers for testing. The li

CFT: New ASLR Patch

2015-02-21 Thread Shawn Webb
the patch is much too large to attach to an email, you can find our latest patch on FreeBSD's Phabricator: https://reviews.freebsd.org/D473 Or download the raw version of the patch: https://reviews.freebsd.org/D473?download=true Please let me know if you find any issues. Thanks, Shawn W

Re: CFT: New ASLR Patch

2015-02-24 Thread Shawn Webb
On Tuesday, February 24, 2015 01:30:19 PM Bartek Rutkowski wrote: > On Sat, Feb 21, 2015 at 3:59 PM, Shawn Webb wrote: > > Hey All, > > > > It has been a long time since we sent out a call for testing request for > > our ASLR patch. We've been hard at work m

Re: Will 11.0-RELEASE include ASLR?

2016-03-09 Thread Shawn Webb
for a smaller prereq patch: https://reviews.freebsd.org/D3565 Thanks, Shawn > > Cheers, > BL > > On Wed, Mar 9, 2016 at 2:05 PM, Piotr Kubaj wrote: > > > -BEGIN PGP SIGNED MESSAGE- > > Hash: SHA256 > > > > Shawn Webb has recently announced that ASLR

Re: Will 11.0-RELEASE include ASLR?

2016-03-09 Thread Shawn Webb
ed, Mar 9, 2016 at 4:22 PM, Shawn Webb > wrote: > > > (Responding inline) > > > > On Wed, Mar 09, 2016 at 04:05:12PM +, Big Lebowski wrote: > > > Hi Piotr, > > > > > > There are people who can probably answer it better, but until they do,

Re: Will 11.0-RELEASE include ASLR?

2016-03-09 Thread Shawn Webb
w speed (e.g. on a server which is hardened in other ways) > or for the extra warm fuzzies that ASLR provides. The great thing is that our implementation comes as a kernel build option, just like you want. Our implementation also works on a per-jail basis. Thanks, -- Shawn

Re: Will 11.0-RELEASE include ASLR?

2016-03-10 Thread Shawn Webb
7;s implementation. It has been a kernel option that you can toggle at compile time with the PAX_ASLR kernel option. IT can also be toggled via /boot/loader.conf by setting hardening.pax.aslr.status=0. Thanks, -- Shawn Webb HardenedBSD GPG Key ID: 0x6A84658F52456EEE GPG Key Fingerprint:

Re: Will 11.0-RELEASE include ASLR?

2016-03-10 Thread Shawn Webb
ck and VDSO randomization. If the implementation that FreeBSD provides is better than HardenedBSD's, we'd likely drop our implementation and go with FreeBSD's. I'll keep an eye on Phabricator today. Thanks, -- Shawn Webb HardenedBSD GPG Key ID: 0x6A84658F52456

Re: freebsd-update and portsnap users still at risk of compromise

2016-08-10 Thread Shawn Webb
es. ASLR helps make more difficult the successful exploitation of buffer overflows, format string vulnerabilities, etc. In HardenedBSD, we've fixed the two libarchive vulnerabilities that FreeBSD is vulnerable to. But the fixes are only band-aids until FreeBSD publishes their fixes,

Re: Proposal for a design for signed kernel/modules/etc

2017-03-27 Thread Shawn Webb
hile icc uses > the intermediate representation. > The only other major thing to discuss is supporting public key chaining. Ideally, digital signature support should also support chaining multiple keys (similar to X.509 PKI). If the accepted solution supported cert chaining, then the solution

Re: The Stack Clash vulnerability

2017-06-20 Thread Shawn Webb
Qualys: > > https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt FreeBSD is indeed affected. I've written a PoC, which works even with the stack guard enabled: https://github.com/lattera/exploits/blob/master/FreeBSD/StackClash/001-stackclash.c Thanks, -- Shawn Webb Co

Re: The Stack Clash vulnerability

2017-06-20 Thread Shawn Webb
: > Hi Shawn, > > Nice p0c, but it don't work with security.bsd.unprivileged_proc_debug=0, > which was initially enabled in the menu with hardening options. > > Pawel. > > > On 20 June 2017 at 14:15, Shawn Webb wrote: > > > On Tue, Jun 20, 2017 at

Re: The Stack Clash vulnerability

2017-06-20 Thread Shawn Webb
Qualys: > > https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt As a follow-up, Stack Clash should now be mitigated in HardenedBSD: https://github.com/HardenedBSD/hardenedBSD/compare/de8124d3bf83d774b66f62d11aee0162d0cd1031...91104ed152d57cde0292b2dc09489fd1f69ea77c Thanks, --

Re: The Stack Clash vulnerability

2017-07-04 Thread Shawn Webb
ced a regression with mysql56-server when stack_guard_page is set to a positive integer value greater than 1. All my testing so far has only been on amd64. I have arm64 devices running the same code, but they don't do nearly as intensive work as my amd64 systems. It seems the MAP_GUARD

Re: OpenSCAP for FreeBSD

2017-07-22 Thread Shawn Webb
naconda-addon/> to set security > profiles during install. I'll get in touch with some of my coworkers, who were instrumental in the creation of SCAP. I'll get their thoughts on LoE for porting to FreeBSD. Depending on their schedules, my response may be delayed. Thanks, -- Shawn W

Re: OpenSCAP for FreeBSD

2017-07-22 Thread Shawn Webb
On Sat, Jul 22, 2017 at 09:17:26AM -0400, Joey Kelly wrote: > On Saturday 22 July 2017 08:47:12 Shawn Webb wrote: > > On Fri, Jul 21, 2017 at 09:49:14PM -0400, Yonas Yanfa wrote: > > > > > > > Yes, and it shouldn't be too hard to port this to FreeBSD

Re: SEGVGUARD in freeBSD

2017-08-03 Thread Shawn Webb
yed, FreeBSD does not support SEGVGUARD at the moment. Thanks, -- Shawn Webb Cofounder and Security Engineer HardenedBSD GPG Key ID: 0x6A84658F52456EEE GPG Key Fingerprint: 2ABA B6BD EF6A F486 BE89 3D9E 6A84 658F 5245 6EEE signature.asc Description: PGP signature

Re: SEGVGUARD in freeBSD

2017-08-04 Thread Shawn Webb
lid wrote: > > > Hello All, > > > > > > I would like to configure SEGVGUARD for few critical applications in > > > FreeBSD10 . Is is available natively in FreeBSD10 ? > > > > > > If so you could anyone help me in enabling/configuring SEGVGUARD >

Re: SEGVGUARD in freeBSD

2017-08-04 Thread Shawn Webb
I forgot to mention that hardening.pax.segvguard.status is a sysctl node. To set it: sysctl hardening.pax.segvguard.status=2 Or in /etc/sysctl.conf: hardening.pax.segvguard.status=2 Thanks, Shawn On Fri, Aug 04, 2017 at 08:46:46AM -0400, Shawn Webb wrote: > After booting HardenedBSD,

Capsicum and connect(2)

2017-09-26 Thread Shawn Webb
t working is calling connect(2) on the socket file descriptor in the parent. errno gets set to ECAPMODE. This is puzzling to me since CAP_CONNECT is set on the descriptor. Any help would be appreciated. Thanks, -- Shawn Webb Cofounder and Security Engineer HardenedBSD GPG Key ID: 0x6A8465

Re: Capsicum and connect(2)

2017-09-26 Thread Shawn Webb
Laurie wrote: > ECAPMODE means the syscall is forbidden, surely? > > On 26 September 2017 at 20:37, Shawn Webb wrote: > > Hey All, > > > > I'm working on applying Capsicum to Tor. I've got a PoC design for how > > I'm going to do it posted here: >

Re: Capsicum and connect(2)

2017-09-26 Thread Shawn Webb
On Tue, Sep 26, 2017 at 07:37:53PM +, Shawn Webb wrote: > Hey All, > > I'm working on applying Capsicum to Tor. I've got a PoC design for how > I'm going to do it posted here: > > https://github.com/lattera/PoCs/tree/master/capsicum_fdpassing > > N

Re: Trust system write-up

2017-10-22 Thread Shawn Webb
;m curious about the rational behind not requiring expiration of trusted root key material. Can jails contain a different trust chain than the host? Thanks, -- Shawn Webb Cofounder and Security Engineer HardenedBSD GPG Key ID: 0x6A84658F52456EEE GPG Key Fingerprint: 2ABA B6BD EF6A F486 BE89 3D9E 6A84 658F 5245 6EEE signature.asc Description: PGP signature

Re: http subversion URLs should be discontinued in favor of https URLs

2017-12-08 Thread Shawn Webb
ur own CA, with the CA cert having a lifetime of twenty years. The key material used to sign the update gets regenerated every year on January 1st, but has a thirteen-month lifespan. The CA key material resides on an encrypted flash drive, stored in a place that requires two signatures from two parties

Re: http subversion URLs should be discontinued in favor of https URLs

2017-12-11 Thread Shawn Webb
disallowed, but TCP:443 is accepted. Thanks, -- Shawn Webb Cofounder and Security Engineer HardenedBSD GPG Key ID: 0x6A84658F52456EEE GPG Key Fingerprint: 2ABA B6BD EF6A F486 BE89 3D9E 6A84 658F 5245 6EEE signature.asc Description: PGP signature

Re: Intel hardware bug

2018-01-03 Thread Shawn Webb
On Tue, Jan 02, 2018 at 08:52:27PM -0500, Mike Tancsa wrote: > I am guessing this will impact FreeBSD as well ? > > http://www.theregister.co.uk/2018/01/02/intel_cpu_design_flaw/ https://meltdownattack.com/ -- Shawn Webb Cofounder and Security Engineer HardenedBSD Tor-ified Signal:

Re: VMware pulling Intel specter patches

2018-01-16 Thread Shawn Webb
t really do much on its own. Granted, I could have misread and be completely wrong. Please let me know if I am. Thanks, -- Shawn Webb Cofounder and Security Engineer HardenedBSD Tor-ified Signal:+1 443-546-8752 GPG Key ID: 0x6A84658F52456EEE GPG Key Fingerprint: 2ABA B6BD EF6A F486 B

Re: Spoiler Alert

2019-03-05 Thread Shawn Webb
On Tue, Mar 05, 2019 at 11:20:51AM -0800, Cy Schubert wrote: > This came over my phone's news feed. Another example that Colin Percival was > right when he wrote his paper on exploiting cache for fun and profit many > years ago. Weird machines are weird. Thanks, -- Shawn Webb

Re: CVE-2019-5599 SACK Slowness (FreeBSD 12 using the RACK TCP Stack)

2019-06-18 Thread Shawn Webb
ncy. It appears that Netflix's advisory (as of this writing) does not include a timeline of events. Would FreeBSD be able to provide its event timeline with regards to CVE-2019-5599? Were any FreeBSD derivatives given advanced notice? If so, which ones? Thanks for your time, resources, and conti

Re: CVE-2019-5599 SACK Slowness (FreeBSD 12 using the RACK TCP Stack)

2019-07-05 Thread Shawn Webb
On Wed, Jul 03, 2019 at 10:18:12AM -0700, Gordon Tetlow wrote: > Sorry for the late response, only so many hours in the day. Completely understood. Thanks for taking the time to respond! > > On Tue, Jun 18, 2019 at 08:06:55PM -0400, Shawn Webb wrote: > > It appears that Netflix

Re: CVE-2019-5599 SACK Slowness (FreeBSD 12 using the RACK TCP Stack)

2019-07-05 Thread Shawn Webb
On Fri, Jul 05, 2019 at 07:52:32AM -0700, Dan Langille wrote: > > On Jul 5, 2019, at 6:40 AM, Shawn Webb wrote: > > > >> On Wed, Jul 03, 2019 at 10:18:12AM -0700, Gordon Tetlow wrote: > >> Sorry for the late response, only so many hours in the day. > > &

Re: ASLR/PIE status in FreeBSD HEAD

2020-04-17 Thread Shawn Webb
algorithms for measuring ASLR was meant to test ASLR, not FreeBSD's ASR implementation. Thus, paxtest results for FreeBSD's ASR are moot. Link to the relevant discussion, as pointed out by the dude who coined the term ASLR: https://reviews.freebsd.org/D5603#120017

Re: FreeBSD Security Advisory FreeBSD-SA-21:07.openssl

2021-03-26 Thread Shawn Webb
result in a crash and a denial of service attack. Hey all, Has anyone looked at if/how setting map_at_zero=1 impacts the null ptr deref issue? Thanks, -- Shawn Webb Cofounder / Security Engineer HardenedBSD https://git.hardenedbsd.org/hardenedbsd/pubkeys/-/raw/master/Shawn_Webb/03A4CBEBB82EA5A

Re: Security leak: Public disclosure of user data without their consent by installing software via pkg

2021-04-06 Thread Shawn Webb
s project, not FreeBSD. 2. You install a package that is made to submit statistical data. 3. You're upset that it submits statistical data? lolwut, -- Shawn Webb Cofounder / Security Engineer HardenedBSD https://git.hardenedbsd.org/hardenedbsd/pubkeys/-/raw/master/Shawn_Webb/03A4CBEBB82EA5A67D9F3853FF2E67A277F8E1FA.pub.asc signature.asc Description: PGP signature

Re: Security leak: Public disclosure of user data without their consent by installing software via pkg

2021-04-06 Thread Shawn Webb
On Tue, Apr 06, 2021 at 04:39:40PM +0200, Miroslav Lachman wrote: > On 06/04/2021 16:27, Shawn Webb wrote: > > > 1. BSDStats isn't run/maintained by the FreeBSD project. File the > > report with the BSDStats project, not FreeBSD. > > 2. You install a package that

Re: Security leak: Public disclosure of user data without their consent by installing software via pkg

2021-04-08 Thread Shawn Webb
lem, you went the hostile route. I'm sure you won't learn anything from this, but I hope you do. To me, it reinforces how random people feel entitled to force their will on others. Thanks, -- Shawn Webb Cofounder / Security Engineer HardenedBSD https://git.hardenedbsd.org/hardenedbsd/pubkeys/-/raw/master/Shawn_Webb/03A4CBEBB82EA5A67D9F3853FF2E67A277F8E1FA.pub.asc signature.asc Description: PGP signature

Re: name:wrek vulnerabilities ?

2021-04-14 Thread Shawn Webb
s referencing a bug that's already fixed in all supported versions of FreeBSD. A lot of hand waving just for "nothing to see here, move along" if your systems are up-to-date. The commit that fixed the vulnerability is 8f594d4355a16f963e246be0b88b9fba8ad77049, made on 31 Aug 2020. That

Re: FreeBSD Security Advisory FreeBSD-SA-23:01.geli

2023-02-08 Thread Shawn Webb
ted with a NULL key file. bsdinstall has a nifty option for using geli to encrypt your ZFS root pool (usually named zroot). Are ZFS pools created by bsdinstall impacted? Thanks, -- Shawn Webb Cofounder / Security Engineer HardenedBSD https://git.hardenedbsd.org/hardenedbsd/pubkeys/-/raw/master/Shawn_Webb/03A4CBEBB82EA5A67D9F3853FF2E67A277F8E1FA.pub.asc signature.asc Description: PGP signature

Re: Zenbleed

2023-07-26 Thread Shawn Webb
main branch. Note that this code is simply Tavis' original PoC, just modified enough to get it to build on FreeBSD and OpenBSD. Thanks, -- Shawn Webb Cofounder / Security Engineer HardenedBSD https://git.hardenedbsd.org/hardenedbsd/pubkeys/-/raw/master/Shawn_Webb/03A4CBEBB82EA5A67D9F3853FF

Re: Zenbleed

2023-07-27 Thread Shawn Webb
On Thu, Jul 27, 2023 at 01:38:09PM -0400, Jung-uk Kim wrote: > On 23. 7. 27., Jung-uk Kim wrote: > > On 23. 7. 27., mike tancsa wrote: > > > On 7/26/2023 5:46 PM, Shawn Webb wrote: > > > > On Wed, Jul 26, 2023 at 08:34:56PM +, 0x1eef wrote: > > > > &

Re: Zenbleed

2023-07-27 Thread Shawn Webb
31 > Thread 0x80068ab00 running on CPU 14 > Thread 0x800686f00 running on CPU 2 > > > CPU: AMD EPYC 7302P 16-Core Processor    (3000.06-MHz K8-class > CPU) I've reverted the old work in favor of Jung-uk Kim's patch in my feature branch (shawn.webb/bsd/main)

Re: Disclosed backdoor in xz releases - FreeBSD not affected

2024-03-29 Thread Shawn Webb
ecifically targeted x86_64 > Linux systems using glibc. Hey Gordon, Is there potential for Linux jails on FreeBSD systems (ie, deployments making use of the Linxulator) to be impacted? Assuming amd64 here, too. Thanks, -- Shawn Webb Cofounder / Security Engineer HardenedBSD Tor-ified Sign

Re: Backdoor in xz 5.6.0

2024-03-29 Thread Shawn Webb
reactionary moment whereby the entire project is audited. Until then, some folks would not consider it over-reactionary to distrust any work since the bad actor started contributing. This would apply to other projects the bad actor contributed to as well, like libarchive. Thanks, -- Shawn Webb