[20908] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Announcing RSX - non exec stack/heap module

daemon@ATHENA.MIT.EDU (Paul Starzetz)
Thu Jun 7 18:04:22 2001

Message-ID: <3B1FBEA9.2C067E66@starzetz.de>
Date: Thu, 07 Jun 2001 19:49:29 +0200
From: Paul Starzetz <paul@starzetz.de>
MIME-Version: 1.0
To: Thomas Dullien <Dullien@gmx.net>,
        "bugtraq@securityfocus.com" <bugtraq@securityfocus.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

Thomas Dullien wrote:
> 
> > It would appearat first glance  that RSX uses the same technique as PAX.
> > Naturally, the PAX and RSX teams should confer to make a definitive
> > statement on similarities and differences.
> 
> Just for the record, the technique bears no similarity. PAX provides
> real, non-executable PAGES on x86 -- RSX remaps the heap segments
> outside of the code segment limit.

To be more precise: RSX does _not_ provide non-exec stack, heap and so
on but the 'complement' speak executable code area. The segments which
are remapped are _not_ the heap(s), speak data segments, but the code
(marked as rx-p) areas.
The basic idea while writing RSX was not to provide some heavy artillery
but a small, very low penalty kernel module stopping not 100 but maybe
95% of wide spread local & remote attacks towards Linux machines.

There cannot be a doubt that installing the module to protect few but
endangered applications (like sshd, rshd, rpc) improves the system
security.

sincerely,

Paul Starzetz

home help back first fref pref prev next nref lref last post