Commit Graph

6 Commits

Author SHA1 Message Date
Wladimir J. van der Laan
c991e348de devtools: Check for high-entropy ASLR in 64-bit PE executables
check_PE_PIE only checked for DYNAMIC_BASE, this is not enough
for (secure) ASLR on 64-bit.
2018-12-23 12:43:33 +01:00
calebogden
8193c2da05 Fixing typos on security-check.py and torcontrol.cpp 2018-11-09 22:47:13 +03:00
isle2983
b520261bd9 [copyright] add MIT License copyright header to remaining Python files
Github-Pull: #8702
Rebased-From: 4677b197f7aa8d35bfc20a5961c3e1c41bb7de39
2018-11-09 21:44:06 +03:00
Wladimir J. van der Laan
b1d5409eb8 build: python 3 compatibility 2018-01-12 21:31:33 +03:00
Cory Fields
aa26ee0101 release: Add security/export checks to gitian and fix current failures
- fix parsing of BIND_NOW with older readelf
- add _IO_stdin_used to ignored exports

For details see: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=634261#109

- add check-symbols and check-security make targets

These are not added to the default checks because some of them depend on
release-build configs.

- always link librt for glibc back-compat builds

glibc absorbed clock_gettime in 2.17. librt (its previous location) is safe to
link in anyway for back-compat.

Fixes #7420

- add security/symbol checks to gitian

Github-Pull: #7424
Rebased-From: cd27bf51e0 475813ba5b f3d3eaf78e a8ce872118 a81c87fafc
2016-01-27 11:33:33 +01:00
Wladimir J. van der Laan
579b863cd7 devtools: Add security-check.py
Perform the following ELF security checks:

- PIE: Check for position independent executable (PIE), allowing for address space randomization
- NX: Check that no sections are writable and executable (including the stack)
- RELRO: Check for read-only relocations, binding at startup
- Canary: Check for use of stack canary

Also add a check to symbol-check.py that checks that only the subset of
allowed libraries is imported (to avoid incompatibilities).
2015-10-22 03:35:38 +02:00