Hi!
I installed the grsec patch on my machine with Debian Woody 2.4.18 kernel and I compiled the kernel with some of the randomized features.
But I can't find the directory /proc/sys/kernel/grsecurity
How can I enable rand_ipids and rand_ttl?
gcc trampolines are independent of glibc versions, you need that emulation if you have applications that use that feature (you'll find them out soon enough because they will crash without emulation).Flanders wrote:I am using glibc 2.2.5 and I have enabled the Openwall non-executable stack. When I read the documentation you said that I must enable also Gcc trampoline support if using glibc 2.0. Do I have to enable this although I am using 2.2.5?
(you'll find them out soon enough because they will crash without emulation).
there is indeed an overhead because emulation requires a user/kernel transition which on i386 is quite expensive (several hundreds of cycles). but that's not the reason for its not being automatic. as Brad already said, emulation (be that gcc trampolines or something else) implies that an attacker can make use of it as well. depending on how much 'state' the code in question changes, it may or may not help the attack. the gcc trampolines allow one to load a register with arbitrary value and jump to an arbitrary location. while the latter gains nothing for an attack, the former does (or may at least) and hence i decided to be on the safe side and not allow automatic emulation.ethan@plaxo.com wrote:Why not just run emulation regardless? I'm assuming that the emulation mode is relatively secure. Is their overhead involved with it enabled?