nitter
PaX Team
@paxteam
pax.grsecurity.net/
Joined February 2010
Tweets
548
Following
2
Followers
2,766
Likes
35
Tweets
Tweets & Replies
Media
Search
Load newest
PaX Team
@paxteam
3 May 2016
new grsecurity blog post on today's Linux kernel JIT spray attack news:
forums.grsecurity.net/viewto…
49
51
PaX Team
@paxteam
30 Apr 2016
spender's prepared a small FAQ on RAP at
grsecurity.net/rap_faq.php
.
1
56
55
PaX Team
@paxteam
29 Apr 2016
and so it begins:
grsecurity.net/rap_announce.…
1
99
70
PaX Team
@paxteam
12 Apr 2016
today reminds me again that BadBugs = BadHype
9
4
PaX Team
@paxteam
9 Mar 2016
re:
code.google.com/p/google-sec…
PAX: size overflow detected in function xt_alloc_table_info net/netfilter/x_tables.c:659 decl: __kmalloc
19
21
PaX Team
@paxteam
22 Feb 2016
@picfim
@grsecurity
RAP scales from xen to linux to chromium (all implemented and tested) though fixing userland is for another life ;).
1
PaX Team
@paxteam
22 Feb 2016
@picfim
@grsecurity
but as i said, supporting this would greatly eliminate the security value of RAP (think chromium vs. flash plugin).
1
PaX Team
@paxteam
22 Feb 2016
@picfim
@grsecurity
the only way to support it is to remove the hash check, e.g., by marking the indirect transfer with an attribute.
PaX Team
@paxteam
22 Feb 2016
@picfim
@grsecurity
the kernel's also special in that there're more opportunities to renew the xor cookie in infinite loops, etc.
PaX Team
@paxteam
22 Feb 2016
@picfim
@grsecurity
as for patches, everything i threw RAP at so far needed fixes (i think you had the same experience ;).
PaX Team
@paxteam
22 Feb 2016
@picfim
@grsecurity
depends on demand, for now i prefer full coverage and thus no exceptions. why should the type hash be moved anywhere?
PaX Team
@paxteam
21 Feb 2016
@picfim
@grsecurity
linking works but indirect transfers to uninstrumented code fail the type hash check at runtime (this is by design).
PaX Team
@paxteam
14 Dec 2015
dromaeo.com/?id=244071,24407…
1
2
5
PaX Team
@paxteam
21 Oct 2015
RAP: RIP ROP
4
46
39
Load more