[Tor-BSD] Hardened Tor

Shawn Webb shawn.webb at hardenedbsd.org
Sat Jan 27 12:02:35 EST 2018


Hey All,

The HardenedBSD 12-CURRENT/amd64 package build just finished, applying
retpoline to the entirety of the ports tree/package repo. Applying
retpoline helps mitigate one of the Spectre variants.

This means that Tor on HardenedBSD 12-CURRENT/amd64 is compiled with:

1. PIE
2. Full RELRO (RELRO + BIND_NOW)
3. CFI (with the cfi-icall scheme disabled)
4. SafeStack
5. Retpoline

All of these layers are going to make life very difficult for an
attacker attempting to exploit the tor daemon itself. If you have any
further suggestions on hardening the tor daemon, please let me know.

Thanks,

-- 
Shawn Webb
Cofounder and Security Engineer
HardenedBSD

Tor-ified Signal:    +1 443-546-8752
GPG Key ID:          0x6A84658F52456EEE
GPG Key Fingerprint: 2ABA B6BD EF6A F486 BE89  3D9E 6A84 658F 5245 6EEE
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://lists.nycbug.org/pipermail/tor-bsd/attachments/20180127/0e899f0f/attachment.bin>


More information about the Tor-BSD mailing list