Domesticating applications, OpenBSD style
Domesticating applications, OpenBSD style
Posted Jul 22, 2015 18:05 UTC (Wed) by PaXTeam (guest, #24616)In reply to: Domesticating applications, OpenBSD style by patrick_g
Parent article: Domesticating applications, OpenBSD style
Posted Jul 22, 2015 18:26 UTC (Wed)
by patrick_g (subscriber, #44470)
[Link]
Posted Jul 26, 2015 19:47 UTC (Sun)
by ploxiln (subscriber, #58395)
[Link]
Just to state the obvious, MS / Windows had most "mitigation" features first, like ASLR and sandboxing, but it was just checkbox features to use for sales purposes, and didn't fix their security problems. There's always the most widely used software on the platform not opting into the security feature or opting out of it, like flash plugin having a root-level helper service to get it out of the browser sandbox, or acrobat reader not opting into ASLR (and running javascript and such), or Office's VB macros and OLE hilariousness, or font kerning scripts running in the kernel. And to top it all off it's all closed source so there's no telling how much ridiculous crap is in there, and no one but Microsoft can do anything about it. Exploits for Windows continue to appear regularly in the wild, despite the industry-leading mitigation features.
Brad has good ideas, and does a lot of work to create working exploits, but has always come off as rather unbalanced in how he values different qualities of software, and wow does this confirm it. Wow.
Domesticating applications, OpenBSD style
Domesticating applications, OpenBSD style