Conversation

When invented Address Space Layout Randomization (ASLR), they already knew its weaknesses. PaX Team knew that ASLR was likely to be an exploit mitigation of a temporary nature; that something better will (and needs to) come along.
Image
1
14
ASLR is meant primarily as a remote exploit mitigation, where attackers do not have access to the libs/bins. ASLR can, in limited cases, help with local attacks, but it's not designed or meant to protect against local attacks.
Image
1
3
That means that ASLR can't protect local attacks, even if the payload comes from a remote source. Example: Javascript in a browser. Attacks that claim ASLR defeat by means of local code execution (like AnC) have a faulty premise: that ASLR was designed to protect these cases.
1
4
So-called "security nerds" will ignore that fact to provide a false narrative that's nothing more than FUD and misinformation.
Image
1
1
Yes, ASLR is meant as a temporary measure. Yes, it has weaknesses. Yes, those weaknesses were publicly disclosed at time of invention. This is why we at #HardenedBSD don't follow the false narrative that ASLR is the best exploit mitigation or even a security silver bullet.
3
2
Replying to and
OpenBSD and FreeBSD don't want to use GPL by choice, since they essentially consider it non-free. They were originally driven away from it by GPL3, which they refused to adopt, so they got stuck with old versions of GNU software, but they also don't want to use GPL2 anymore.
2
Show replies
Replying to and
Exactly. The FreeBSD Foundation has a desire to remove all GPL code from the base OS. I myself won't accept GPL (any version) code into HardenedBSD unless it's inherited from upstream FreeBSD (_and_ there must be good reason.)
1