From mboxrd@z Thu Jan 1 00:00:00 1970 From: ng0 Subject: Hardening (was: Re: tor: update to 0.2.9.9) Date: Tue, 24 Jan 2017 20:56:48 +0000 Message-ID: <87bmuw2n3j.fsf@wasp.i-did-not-set--mail-host-address--so-tickle-me> References: <20170124111934.16080-1-contact.ng0@cryptolab.net> <20170124190726.GB6110@jasmine> Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Return-path: Received: from eggs.gnu.org ([2001:4830:134:3::10]:44691) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1cW87x-0008JB-Vd for guix-devel@gnu.org; Tue, 24 Jan 2017 15:55:43 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1cW87u-0002jF-On for guix-devel@gnu.org; Tue, 24 Jan 2017 15:55:42 -0500 Received: from fragranza.investici.org ([2a00:1dc0:2479::19]:50036) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1cW87u-0002iY-DM for guix-devel@gnu.org; Tue, 24 Jan 2017 15:55:38 -0500 In-Reply-To: <20170124190726.GB6110@jasmine> List-Id: "Development of GNU Guix and the GNU System distribution." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guix-devel-bounces+gcggd-guix-devel=m.gmane.org@gnu.org Sender: "Guix-devel" To: Leo Famulari Cc: guix-devel@gnu.org Leo Famulari writes: > On Tue, Jan 24, 2017 at 11:19:33AM +0000, contact.ng0@cryptolab.net wro= te: >> Changes in version 0.2.9.9 - 2017-01-23 >> o Major bugfixes (security): >> - Downgrade the "-ftrapv" option from "always on" to "only on when >> --enable-expensive-hardening is provided." This hardening option= , >> like others, can turn survivable bugs into crashes -- and having >> it on by default made a (relatively harmless) integer overflow b= ug >> into a denial-of-service bug. Fixes bug 21278 (TROVE-2017-001); >> bugfix on 0.2.9.1-alpha. > > I'm not familiar with Tor's build system. > > Should we build Tor with "--enable-expensive-hardening"? I will take a look later what can be applied other than the default configure flags. I'm all for hardening, but it seems that the first basic ideas for Guix are stuck in the idea state. It would be great to see some movement on this during this year. I volunteer to help with it, though I don't have as much experience with SELinux (and only basic experience with GrSecurity without a modular kernel like GuixSD uses). --=20 =E2=99=A5=E2=92=B6 ng0 -- https://www.inventati.org/patternsinthechaos/