[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] Unable to compile Xen-2.0



> SSP is Stack Smashing Protection - formerly ProPolice (see 
> http://www.trl.ibm.com/projects/security/ssp/ for more info) and PIE is 
> Position Independent Executable i.e. PIC for binaries. SSP modifies the 
> C compiler to insert initialization code into functions that create a 
> buffer in memory. At run time, when a buffer is created, SSP adds a 
> secret random value, the canary, to the end of the buffer. When the 
> function returns, SSP makes sure that the canary is still intact. If an 
> attacker were to perform a buffer overflow, he would overwrite this 
> value and trigger that stack smashing handler. Currently this kills the 
> target process. (Descriptions borrowed from Gentoo Hardened Project 
> http://www.gentoo.org/proj/en/hardened/) They provide an extra layer of 
> security from attack on a server open to the world.

Does stock Linux work when compiled with SSP enabled? Sounds
pretty scary to me...

Ian


-------------------------------------------------------
This SF.Net email is sponsored by:
Sybase ASE Linux Express Edition - download now for FREE
LinuxWorld Reader's Choice Award Winner for best database on Linux.
http://ads.osdn.com/?ad_id=5588&alloc_id=12065&op=click
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxxx
https://lists.sourceforge.net/lists/listinfo/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.