Conversation

Replying to
You should read newer information including on the value that ASan provides for an attacker, including from people who work on it. There are substantial drawbacks to using it. It's not simply a way of getting some weak memory protections. It causes substantial harm too.
1
2
Replying to
could you please share us further details to support your claims? you mentioned about those 'values' and 'substantial harm'? would that affect the FF ASan build?
2
Replying to
You're proposing doing something that was temporarily adopted by the Tor Project for a variant of the Tor Browser and then later determined to be a mistake. It has been consistently recommended against by researchers and the developers of ASan. You can do what you want though.
1
1
Replying to
I told you that you should read newer information from security researchers, ASan developers and take a look at how the Tor Project misused it for this and then determined it was a bad idea.
2
1
Replying to and
ASan makes you lose mitigations. It's not simply adding checks. You're removing security features in order to use it. It logs errors by default and then continues on since it's a debugging tool. It can be configured set to stop after reporting an error but it's not the default.
1
1
Replying to and
Chromium has a sandbox protecting sites and browser data. Firefox doesn't: once the attack does the initial exploit and controls the renderer, they have everything in the browser. The sandbox protects the rest of the OS. Chromium has CFI, and other hardening not in Firefox too.
1
1