Re: Introducing security hardening features for Lenny

2008-03-05 Thread Pierre Habouzit
On Wed, Mar 05, 2008 at 05:48:57PM +, Kees Cook wrote: > On Wed, Mar 05, 2008 at 10:16:52AM +0100, Pierre Habouzit wrote: > > On Wed, Mar 05, 2008 at 06:16:33AM +, Kees Cook wrote: > > > I finally got some time to run some benchmarks. I checked the results[1] > > > into the "hardening" svn

Re: Introducing security hardening features for Lenny

2008-03-05 Thread Don Armstrong
On Wed, 05 Mar 2008, Kees Cook wrote: > On Wed, Mar 05, 2008 at 01:29:01AM -0800, Don Armstrong wrote: > > Just for future reference, it'd probably be better to run more than 5 > > tests of each population in the future > > Getting larger data sets will be rather time-consuming -- especially > for

Re: Introducing security hardening features for Lenny

2008-03-05 Thread Matthew Rosewarne
While these benchmarks should show any differences in raw processing performance, there's also the question of what differences the hardening measures make to application start-up times. PIE in particular should cause some slowdown when the executables are first run, but it would take some oth

Re: Introducing security hardening features for Lenny

2008-03-05 Thread Steinar H. Gunderson
On Wed, Mar 05, 2008 at 09:55:37AM -0800, Kees Cook wrote: >>> t.test(x=c(10.87,10.873,10.854,10.809,10.877),y=c(10.807,10.824,10.963,10.84,10.838)) > What tool is this you're using? GNU R. Takes a while to get into, but hard to beat for statistics. >> data: c(10.87, 10.873, 10.854, 10.809, 10.8

Re: Introducing security hardening features for Lenny

2008-03-05 Thread Kees Cook
On Wed, Mar 05, 2008 at 01:29:01AM -0800, Don Armstrong wrote: > Just for future reference, it'd probably be better to run more than 5 > tests of each population in the future, as 5 tests means you'll only > detect very large differences in performance at any reasonable level > of signifigance. I

Re: Introducing security hardening features for Lenny

2008-03-05 Thread Kees Cook
On Wed, Mar 05, 2008 at 10:16:52AM +0100, Pierre Habouzit wrote: > On Wed, Mar 05, 2008 at 06:16:33AM +, Kees Cook wrote: > > I finally got some time to run some benchmarks. I checked the results[1] > > into the "hardening" svn tree, in case other people want to contribute > > more stuff. > >

Re: Introducing security hardening features for Lenny

2008-03-05 Thread Don Armstrong
On Tue, 04 Mar 2008, Kees Cook wrote: > mplayer doesn't compile with PIE due to the various ASM routines. (I've > noted this failure mode in the wiki[2] now.) However, with everything > else enabled (including FORTIFY_SOURCE), there was no measurable > difference (it was below the percentage diff

Re: Introducing security hardening features for Lenny

2008-03-05 Thread Pierre Habouzit
On Wed, Mar 05, 2008 at 06:16:33AM +, Kees Cook wrote: > Hi, > > I finally got some time to run some benchmarks. I checked the results[1] > into the "hardening" svn tree, in case other people want to contribute > more stuff. > > On Wed, Jan 30, 2008 at 08:46:55PM +0100, Moritz Muehlenhoff wr

Re: Introducing security hardening features for Lenny

2008-03-04 Thread Kees Cook
Hi, I finally got some time to run some benchmarks. I checked the results[1] into the "hardening" svn tree, in case other people want to contribute more stuff. On Wed, Jan 30, 2008 at 08:46:55PM +0100, Moritz Muehlenhoff wrote: > Video: > mplayer with the -benchmark option in conjunction with -n

Re: Introducing security hardening features for Lenny

2008-02-04 Thread Ron Johnson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 02/04/08 05:45, Riku Voipio wrote: > On Sun, Feb 03, 2008 at 08:53:00PM +0100, Moritz Muehlenhoff wrote: >> Did you followup with upstream on the SSP problems we've seen >> on ARM? > > Basicly their response was basicly "why would anyone want > 5-1

Re: Introducing security hardening features for Lenny

2008-02-04 Thread Riku Voipio
On Sun, Feb 03, 2008 at 08:53:00PM +0100, Moritz Muehlenhoff wrote: > Did you followup with upstream on the SSP problems we've seen > on ARM? Basicly their response was basicly "why would anyone want 5-10% bigger and slower binaries on arm". It was also discussed the possibility of --disable-ssp w

Re: Introducing security hardening features for Lenny

2008-02-03 Thread Moritz Muehlenhoff
John Goerzen wrote: > However, I am concerned that is appears to be limited in scope to packages > that: > > * Are written in C or C++ > > * Can have hardening achieved through technical changes to the build process > > I think it is important to remember that other languages can have security

Re: Introducing security hardening features for Lenny

2008-02-03 Thread Moritz Muehlenhoff
Riku Voipio wrote: >> In kernels that support text ASLR, programs compiled >> for PIE will gain full position randomization. > > For which architectures is text ASLR available? does it require > external kernel patches? PIE means considerable system overhead > and fatter binaries, especially for sy

Re: Introducing security hardening features for Lenny

2008-01-30 Thread Daniel Burrows
On Tue, Jan 29, 2008 at 09:31:00PM -0600, John Goerzen <[EMAIL PROTECTED]> was heard to say: > On Tuesday 29 January 2008 4:31:51 pm Yves-Alexis Perez wrote: > > On mar, 2008-01-29 at 15:47 -0600, John Goerzen wrote: > > > I notice, for instance, that the latest cups > > > requires avahi. Can we

Re: Introducing security hardening features for Lenny

2008-01-30 Thread Kees Cook
On Wed, Jan 30, 2008 at 11:41:41AM +0200, Riku Voipio wrote: > On Tue, Jan 29, 2008 at 10:16:24PM +0100, Moritz Muehlenhoff wrote: > > In kernels that support text ASLR, programs compiled > > for PIE will gain full position randomization. > > For which architectures is text ASLR available? does it

Re: Introducing security hardening features for Lenny

2008-01-30 Thread Pierre Habouzit
On Wed, Jan 30, 2008 at 07:46:55PM +, Moritz Muehlenhoff wrote: > Kees Cook wrote: > > Does anyone have any good test harnesses we can try this on? I'd be > > more than happy to run them on some modern hardware. > > Video: > mplayer with the -benchmark option in conjunction with -nosound and

Re: Introducing security hardening features for Lenny

2008-01-30 Thread Moritz Muehlenhoff
Kees Cook wrote: > Does anyone have any good test harnesses we can try this on? I'd be > more than happy to run them on some modern hardware. Video: mplayer with the -benchmark option in conjunction with -nosound and -vo. HTML rendering: Mike Hommey once blogged about benchmarking the ACID test:

Re: Introducing security hardening features for Lenny

2008-01-30 Thread Michael Banck
On Tue, Jan 29, 2008 at 04:15:27PM -0800, Kees Cook wrote: > On Tue, Jan 29, 2008 at 11:17:37PM +0100, sean finney wrote: > In trying to not duplicate effort, I've been working both in Debian and > Ubuntu to help get these options enabled globally. > > > I have to repeat the question that tfheen a

Re: Introducing security hardening features for Lenny

2008-01-30 Thread Riku Voipio
On Tue, Jan 29, 2008 at 10:16:24PM +0100, Moritz Muehlenhoff wrote: > In kernels that support text ASLR, programs compiled > for PIE will gain full position randomization. For which architectures is text ASLR available? does it require external kernel patches? PIE means considerable system overhea

Re: Introducing security hardening features for Lenny

2008-01-30 Thread Pierre Habouzit
On Tue, Jan 29, 2008 at 11:47:57PM +, brian m. carlson wrote: > And now for some numbers, on an amd64 machine (/proc/cpuinfo at [0]), Oh and I missed that at the first read, but … > With -fPIE -pie only: > > MD4: 335544320 bytes in 0.741s (431.703 MiB/s) > MD5: 335544320 bytes in 1.052s (

Re: Introducing security hardening features for Lenny

2008-01-30 Thread Pierre Habouzit
On Tue, Jan 29, 2008 at 11:47:57PM +, brian m. carlson wrote: > In conclusion, there is no appreciable performance hit on any algorithm. > Note that these are all hash algorithms, but they all make heavy use of > memcpy, and are extremely CPU-intensive. OTOH the memcpy they use are static

Re: Introducing security hardening features for Lenny

2008-01-29 Thread David Baron
On Tuesday 29 January 2008, Moritz Muehlenhoff wrote: > The Debian archive is the biggest of all distributions and although > there's security support for all security issues being found, there's > still room for improvement and a need for increased resilience against > flaws not yet discovered. >

Re: Introducing security hardening features for Lenny

2008-01-29 Thread Yves-Alexis Perez
On mar, 2008-01-29 at 21:31 -0600, John Goerzen wrote: > It wound up pulling in the daemon on my box. Though it could be that > the > daemon was already installed because kde required it, and upgrading > cups > required the upgraded lib, and the daemon wouldn't work with the > upgraded > lib, s

Re: Introducing security hardening features for Lenny

2008-01-29 Thread John Goerzen
On Tuesday 29 January 2008 4:31:51 pm Yves-Alexis Perez wrote: > On mar, 2008-01-29 at 15:47 -0600, John Goerzen wrote: > > I notice, for instance, that the latest cups > > requires avahi. Can we build it without that and install it without > > that by > > default for those that don't need it, to

Re: Introducing security hardening features for Lenny

2008-01-29 Thread Kees Cook
On Tue, Jan 29, 2008 at 11:17:37PM +0100, sean finney wrote: > On Tuesday 29 January 2008 10:16:24 pm Moritz Muehlenhoff wrote: > > A group of people have been working on introducing advanced security > > hardening features into our archive: > > http://alioth.debian.org/projects/hardening/ > > > i

Re: Introducing security hardening features for Lenny

2008-01-29 Thread Kees Cook
On Tue, Jan 29, 2008 at 11:45:32PM +0100, Pierre Habouzit wrote: > * SSP has a cost proportional to the number of calls an application > performs (If I'm correct), which in CPU intensive tasks may become an > issue. In testing I've done, this is trivial overhead. Note that the extra code is o

Re: Introducing security hardening features for Lenny

2008-01-29 Thread brian m. carlson
On Tue, Jan 29, 2008 at 11:45:32PM +0100, Pierre Habouzit wrote: On Tue, Jan 29, 2008 at 10:31:48PM +, Moritz Muehlenhoff wrote: There are certainly performance trade-offs involved and the final selection of features will depend on the testing of the respective maintainers (testing should be

Re: Introducing security hardening features for Lenny

2008-01-29 Thread Thomas Bushnell BSG
On Wed, 2008-01-30 at 00:21 +0100, Moritz Muehlenhoff wrote: > Thomas Bushnell BSG wrote: > > For my money, you blew it. You don't bootstrap a discussion by > > presenting a pseudo-official email like the one you posted. But we can > > get back to that discussion: cancel the email by saying "who

Re: Introducing security hardening features for Lenny

2008-01-29 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Moritz Muehlenhoff wrote: > The Debian archive is the biggest of all distributions and although > there's security support for all security issues being found, there's > still room for improvement and a need for increased resilience against > flaws no

Re: Introducing security hardening features for Lenny

2008-01-29 Thread Moritz Muehlenhoff
Thomas Bushnell BSG wrote: > For my money, you blew it. You don't bootstrap a discussion by > presenting a pseudo-official email like the one you posted. But we can > get back to that discussion: cancel the email by saying "whoops, we're > not ready yet" and then having the discussion first. Of

Re: Introducing security hardening features for Lenny

2008-01-29 Thread Yves-Alexis Perez
On mar, 2008-01-29 at 15:47 -0600, John Goerzen wrote: > I notice, for instance, that the latest cups > requires avahi. Can we build it without that and install it without > that by > default for those that don't need it, to eliminate Yet Another Daemon? You do know that it depends on the lib,

Re: Introducing security hardening features for Lenny

2008-01-29 Thread Pierre Habouzit
On Tue, Jan 29, 2008 at 10:31:48PM +, Moritz Muehlenhoff wrote: > There are certainly performance trade-offs involved and the final > selection of features will depend on the testing of the respective > maintainers (testing should be eased by hardening-wrapper). I understand. To be fair, I'm

Re: Introducing security hardening features for Lenny

2008-01-29 Thread Thomas Bushnell BSG
On Tue, 2008-01-29 at 23:31 +0100, Moritz Muehlenhoff wrote: > Pierre Habouzit wrote: > There are certainly performance trade-offs involved and the final > selection of features will depend on the testing of the respective > maintainers (testing should be eased by hardening-wrapper). What bothers

Re: Introducing security hardening features for Lenny

2008-01-29 Thread sean finney
hi moritz, On Tuesday 29 January 2008 10:16:24 pm Moritz Muehlenhoff wrote: > A group of people have been working on introducing advanced security > hardening features into our archive: > http://alioth.debian.org/projects/hardening/ > > We recommend to activate the following features in individual

Re: Introducing security hardening features for Lenny

2008-01-29 Thread Moritz Muehlenhoff
Pierre Habouzit wrote: >> Fortify Source >> =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D >>=20 >> This feature adds validation for internal C functions such as strcpy >> for buffer sizes known during compile time. While vulnerabilities in >> the functions it protects have become uncommon in high-prof

Re: Introducing security hardening features for Lenny

2008-01-29 Thread Pierre Habouzit
On Tue, Jan 29, 2008 at 09:48:43PM +, William Pitcock wrote: > On Tue, 2008-01-29 at 22:37 +0100, Pierre Habouzit wrote: > > On Tue, Jan 29, 2008 at 09:16:24PM +, Moritz Muehlenhoff wrote: > > > Fortify Source > > > == > > > > > > This feature adds validation for internal C fun

Re: Introducing security hardening features for Lenny

2008-01-29 Thread William Pitcock
On Tue, 2008-01-29 at 22:37 +0100, Pierre Habouzit wrote: > On Tue, Jan 29, 2008 at 09:16:24PM +, Moritz Muehlenhoff wrote: > > Fortify Source > > == > > > > This feature adds validation for internal C functions such as strcpy > > for buffer sizes known during compile time. While v

Re: Introducing security hardening features for Lenny

2008-01-29 Thread John Goerzen
On Tue January 29 2008 3:16:24 pm Moritz Muehlenhoff wrote: > Scope of this proposal > == > > The target for Lenny is to enable these features in all applications > with potential security impact, specifically: > > - Your application is written in C / C++ > - If your package wa

Re: Introducing security hardening features for Lenny

2008-01-29 Thread Pierre Habouzit
On Tue, Jan 29, 2008 at 09:16:24PM +, Moritz Muehlenhoff wrote: > Fortify Source > == > > This feature adds validation for internal C functions such as strcpy > for buffer sizes known during compile time. While vulnerabilities in > the functions it protects have become uncommon in