Re: shepherd: hardening error handling

2023-12-15 Thread Attila Lendvai
while i found this bug: https://issues.guix.gnu.org/67839 i was reading the discussion under its probable root cause: https://github.com/wingo/fibers/issues/29 and it suggests that Guile before 3.0.5 had important bugs WRT fluids, which are relied upon in shepherd. maybe Guile 2.2 can not be u

Re: shepherd: hardening error handling

2023-12-09 Thread Ludovic Courtès
Hello! Attila Lendvai skribis: > the codebase seems to use catch/throw, and at some places with comments like > "for Guile 2.2". what is the minimum guile version that the shepherd codebase > wants to support? the README says "GNU Guile 3.0.x or 2.2.x". is this still > intended? or can i assu

shepherd: hardening error handling

2023-12-08 Thread Attila Lendvai
dear Guix, i'm working on hardening shepherd's error handling and logging to debug an issue that i'm facing. these changes escalated quickly, so i'm writing to clarify a few things before i shape the codebase into a direction that the maintainers will not accept. the c

Re: hardening

2018-03-22 Thread ng0
Let's keep this thread as the thread to discuss possible solutions and work in that field. Yesterday Marius wrote on IRC (https://gnunet.org/bot/log/guix/2018-03-21#T1657250): [] This is a pretty good article about build flags (mainly hardening related):

Re: hardening

2018-03-11 Thread Ricardo Wurmus
ng0 writes: >> > The flags I use (suggested by Debian Wiki[0]) are: >> > >> > CPPFLAGS=-D_FORTIFY_SOURCE=2 >> >> How does this differ from "-O2 -D_FORTIFY_SOURCE" in CFLAGS? >> I know O2 is optimization and that FORTIFY_SOURCE requires optimization >> to be specified. > > Okay, I've read some

Re: hardening

2018-03-11 Thread ng0
n CFLAGS? > >> I know O2 is optimization and that FORTIFY_SOURCE requires optimization > >> to be specified. > > > > Okay, I've read some related commits and bug tickets, I understand > > the difference now. > > Please share. Otherwise this commen

Re: hardening

2018-03-11 Thread ng0
ng0 transcribed 1.6K bytes: > Alex Vong transcribed 1.3K bytes: > > Hello, > > > > n...@n0.is writes: > > > > > Hi, > > > > > > as we've long talked and not really taken action on hardening builds > > > I've started work

Re: hardening

2018-03-11 Thread ng0
Alex Vong transcribed 1.3K bytes: > Hello, > > n...@n0.is writes: > > > Hi, > > > > as we've long talked and not really taken action on hardening builds > > I've started working on an opt-in way as last discussed in > > september 2016, modifyi

Re: hardening

2018-01-31 Thread Alex Vong
Hello, n...@n0.is writes: > Hi, > > as we've long talked and not really taken action on hardening builds > I've started working on an opt-in way as last discussed in > september 2016, modifying the gnu-build-system with a > #:hardening-flags keyword. > >

Re: hardening

2018-01-29 Thread ng0
and testing. I'll send patches as soon as I have something to go with, today I only had breakage on the bootstrap level ;) > On Mon, Jan 29, 2018, at 4:44 AM, n...@n0.is wrote: >> Hi, >> >> as we've long talked and not really taken action on hardening builds >&g

Re: hardening

2018-01-29 Thread Joshua Branson
Is this something anyone can start using now? Like I can modify my config.scm file somehow and start enjoying a hardened guix? On Mon, Jan 29, 2018, at 4:44 AM, n...@n0.is wrote: > Hi, > > as we've long talked and not really taken action on hardening builds > I've starte

hardening

2018-01-29 Thread ng0
Hi, as we've long talked and not really taken action on hardening builds I've started working on an opt-in way as last discussed in september 2016, modifying the gnu-build-system with a #:hardening-flags keyword. For my testing purposes I will use > CFLAGS="-fPIE -fs

Re: tor with --expensive-hardening is using way too much memory

2017-07-29 Thread ng0
shepherd > > 26.7 MiB + 551.5 KiB = 27.3 MiB emacs-25.2 > > 131.1 MiB + 6.2 MiB = 137.3 MiB .guix-real > > 732.7 MiB + 932.0 KiB = 733.6 MiB tor > > … > > uptime: 6:24h > > > > Now I wouldn't consider tor to be problematic when

Re: tor with --expensive-hardening is using way too much memory

2017-07-19 Thread Kei Kebreau
to be problematic when this would be the > default for tor. But it isn't, and --enable-expensive-hardening is an > experimental function which is not enabled by default from upstream (as > all our recently added config options for tor (not sure right now if all > are experimental

tor with --expensive-hardening is using way too much memory

2017-07-19 Thread ng0
= 27.3 MiB emacs-25.2 131.1 MiB + 6.2 MiB = 137.3 MiB .guix-real 732.7 MiB + 932.0 KiB = 733.6 MiB tor … uptime: 6:24h Now I wouldn't consider tor to be problematic when this would be the default for tor. But it isn't, and --enable-expensive-hardening is an experimenta

Re: [PATCH] gnu: tor: Add hardening configure-flags.

2017-01-30 Thread Ludovic Courtès
contact@cryptolab.net skribis: > From: ng0 > > * gnu/packages/tor.scm (tor)[arguments]: Add '--enable-expensive-hardening', > 'enable-gcc-hardening', '--enable-linker-hardening' to configure-flags. Applied, thanks. Ludo'.

Re: [PATCH] gnu: tor: Add hardening configure-flags.

2017-01-30 Thread Leo Famulari
On Wed, Jan 25, 2017 at 09:31:07AM +, contact@cryptolab.net wrote: > From: ng0 > > * gnu/packages/tor.scm (tor)[arguments]: Add '--enable-expensive-hardening', > 'enable-gcc-hardening', '--enable-linker-hardening' to configure-flags. LGTM. Does anyone else want to test before pushing?

Re: Hardening

2017-01-30 Thread ng0
now, look at Hardened-gentoo and other systems how >>> they solve issues. Afterwards we need to address the toolchain >>> level, which to our advantage can be an make and break by hydra >>> and everyone who wants to contribute to fixing issues can run >>> th

Re: Hardening

2017-01-30 Thread ng0
>> they solve issues. Afterwards we need to address the toolchain >> level, which to our advantage can be an make and break by hydra >> and everyone who wants to contribute to fixing issues can run >> their system from the hardening-toolchain-wip branch to >> contri

Re: Hardening

2017-01-25 Thread Ludovic Courtès
he toolchain > level, which to our advantage can be an make and break by hydra > and everyone who wants to contribute to fixing issues can run > their system from the hardening-toolchain-wip branch to > contribute to fixing all the breaking applications. > > Then we need to disc

Re: Hardening

2017-01-25 Thread ng0
Ricardo Wurmus writes: > Leo Famulari writes: > >> On Tue, Jan 24, 2017 at 08:56:48PM +, ng0 wrote: >>> Leo Famulari writes: >>> > Should we build Tor with "--enable-expensive-hardening"? >>> >>> I will take a look later w

[PATCH] gnu: tor: Add hardening configure-flags.

2017-01-25 Thread contact . ng0
From: ng0 * gnu/packages/tor.scm (tor)[arguments]: Add '--enable-expensive-hardening', 'enable-gcc-hardening', '--enable-linker-hardening' to configure-flags. --- gnu/packages/tor.scm | 4 1 file changed, 4 insertions(+) diff --git a/gnu/packages/tor.sc

Re: Hardening (was: Re: tor: update to 0.2.9.9)

2017-01-25 Thread Ricardo Wurmus
Leo Famulari writes: > On Tue, Jan 24, 2017 at 08:56:48PM +, ng0 wrote: >> Leo Famulari writes: >> > Should we build Tor with "--enable-expensive-hardening"? >> >> I will take a look later what can be applied other than the >> default config

Re: Hardening (was: Re: tor: update to 0.2.9.9)

2017-01-24 Thread ng0
n. >>> >>> No, I would say this needs an effort of more than one person. At >>> best a team of people who either are willing to learn about >>> system hardening or already know enough, maybe even a combination >>> of both to share knowledge :) >>

Re: Hardening (was: Re: tor: update to 0.2.9.9)

2017-01-24 Thread ng0
have as much >> >>> experience with SELinux (and only basic experience with >> >>> GrSecurity without a modular kernel like GuixSD uses). >> >> >> >> Yes, this effort needs a champion. >> >> No, I would say this needs an effort of

Re: Hardening (was: Re: tor: update to 0.2.9.9)

2017-01-24 Thread Leo Famulari
ience with SELinux (and only basic experience with > >>> GrSecurity without a modular kernel like GuixSD uses). > >> > >> Yes, this effort needs a champion. > > No, I would say this needs an effort of more than one person. At > best a team of people who either are w

Re: Hardening (was: Re: tor: update to 0.2.9.9)

2017-01-24 Thread ng0
ng0 writes: > Leo Famulari writes: > >> On Tue, Jan 24, 2017 at 08:56:48PM +, ng0 wrote: >>> Leo Famulari writes: >>> > Should we build Tor with "--enable-expensive-hardening"? >>> >>> I will take a look later what can be app

Re: Hardening (was: Re: tor: update to 0.2.9.9)

2017-01-24 Thread ng0
Leo Famulari writes: > On Tue, Jan 24, 2017 at 08:56:48PM +, ng0 wrote: >> Leo Famulari writes: >> > Should we build Tor with "--enable-expensive-hardening"? >> >> I will take a look later what can be applied other than the >> default configu

Re: Hardening (was: Re: tor: update to 0.2.9.9)

2017-01-24 Thread Leo Famulari
On Tue, Jan 24, 2017 at 08:56:48PM +, ng0 wrote: > Leo Famulari writes: > > Should we build Tor with "--enable-expensive-hardening"? > > I will take a look later what can be applied other than the > default configure flags. > > I'm all for hardening,

Hardening (was: Re: tor: update to 0.2.9.9)

2017-01-24 Thread ng0
Leo Famulari writes: > On Tue, Jan 24, 2017 at 11:19:33AM +, contact@cryptolab.net wrote: >> Changes in version 0.2.9.9 - 2017-01-23 >> o Major bugfixes (security): >> - Downgrade the "-ftrapv" option from "always on" to "only on

Re: Hardening

2016-09-03 Thread ng0
gt;>> packages will not get these flags, for instance because they pass their >>> own #:configure-flags. >>> >>> IOW, it will take a whole rebuild to find out exactly what’s going on >>> and to fix any issues. >>> >>> Would you lik

Re: Hardening

2016-09-02 Thread Ludovic Courtès
>> >> IOW, it will take a whole rebuild to find out exactly what’s going on >> and to fix any issues. >> >> Would you like to start working on it? Then we could create a branch, >> have Hydra build it, and incrementally fix things. > > We should pick th

Re: Hardening

2016-08-20 Thread Alex Vong
ild, and (2) another third of the >>>>> packages will not get these flags, for instance because they pass their >>>>> own #:configure-flags. >>>>> >>>>> IOW, it will take a whole rebuild to find out exactly what’s going on >>>>

Re: Hardening

2016-08-19 Thread ng0
ild, and (2) another third of the >>>>> packages will not get these flags, for instance because they pass their >>>>> own #:configure-flags. >>>>> >>>>> IOW, it will take a whole rebuild to find out exactly what’s going on >>>>

Re: Hardening

2016-08-17 Thread ng0
t;> own #:configure-flags. >>>> >>>> IOW, it will take a whole rebuild to find out exactly what’s going on >>>> and to fix any issues. >>>> >>>> Would you like to start working on it? Then we could create a branch, >>>> have H

Re: Hardening

2016-08-17 Thread Alex Vong
to fix any issues. >>> >>> Would you like to start working on it? Then we could create a branch, >>> have Hydra build it, and incrementally fix things. >> >> We should pick this project back up. I was suprised to find we haven't >> done anything li

Re: Hardening

2016-08-16 Thread Ricardo Wurmus
>> >> IOW, it will take a whole rebuild to find out exactly what’s going on >> and to fix any issues. >> >> Would you like to start working on it? Then we could create a branch, >> have Hydra build it, and incrementally fix things. > > We should pick th

Re: Hardening

2016-08-16 Thread Leo Famulari
; Would you like to start working on it? Then we could create a branch, > have Hydra build it, and incrementally fix things. We should pick this project back up. I was suprised to find we haven't done anything like this after reading this recent blog post about Nix's hardening effort: https://blog.mayflower.de/5800-Hardening-Compiler-Flags-for-NixOS.html?utm_source=twitterfeed&utm_medium=twitter

Hardening

2015-12-30 Thread Ludovic Courtès
ages, something > like `use this set of flags, please'. For example, in Debian, if you > type > > $ dpkg-buildflags --get CFLAGS > > you get > > -g -O2 -fstack-protector-strong -Wformat -Werror=format-security > > which are thr default flags to be exported during