Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 7 Nov 2010 20:29:07 -0500
From: Dan Rosenberg <dan.j.rosenberg@...il.com>
To: oss-security@...ts.openwall.com
Subject: Re: Linux kernel proactive security hardening

Thanks for your input.

I've just posted an RFC for the equivalent of grsecurity's MODHARDEN,
which places restrictions on the automatic loading of modules by
unprivileged users:

http://lkml.org/lkml/2010/11/7/212

-Dan

On Sun, Nov 7, 2010 at 8:16 PM, Solar Designer <solar@...nwall.com> wrote:
> Kees, Dan -
>
> Thank you for working on this!
>
> On Sun, Nov 07, 2010 at 02:16:32PM -0800, Kees Cook wrote:
>> And there's a sign-up list here, for people interested in helping out:
>>
>> https://wiki.ubuntu.com/SecurityTeam/Roadmap/KernelHardening#Upstream%20Hardening
>
> I've just added a few hardening changes to consider (and edited/moved a
> few others):
>
> https://wiki.ubuntu.com/SecurityTeam/Roadmap/KernelHardening?action=diff&rev2=41&rev1=37
>
> Sorry I did not sign up for any yet, although if I happen to work on any
> I'll let you know.
>
> I'd appreciate it if you keep the page updated with current status on
> and links to work-in-progress and proposed patches.
>
> Thanks again,
>
> Alexander
>

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.