Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 21 Aug 2014 10:55:41 -0500
From:      Bryan Drewery <bdrewery@FreeBSD.org>
To:        Ronald Klop <ronald-lists@klop.ws>, Ports FreeBSD <freebsd-ports@freebsd.org>
Subject:   Re: [CFT] SSP Package Repository available
Message-ID:  <53F6167D.2030303@FreeBSD.org>
In-Reply-To: <op.xkxx31g5kndu52@ronaldradial.radialsg.local>
References:  <523D79CD.2090302@FreeBSD.org> <53F4CE0E.8040106@FreeBSD.org> <op.xkxx31g5kndu52@ronaldradial.radialsg.local>

next in thread | previous in thread | raw e-mail | index | archive | help
This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--3cvpddJPLVi4sHvP3w9GB7dlEdgTSik23
Content-Type: text/plain; charset=windows-1252
Content-Transfer-Encoding: quoted-printable

On 8/21/2014 6:56 AM, Ronald Klop wrote:
> On Wed, 20 Aug 2014 18:34:22 +0200, Bryan Drewery <bdrewery@freebsd.org=
>
> wrote:
>=20
>> On 9/21/2013 5:49 AM, Bryan Drewery wrote:
>>> Ports now support enabling Stack Protector [1] support on FreeBSD 10
>>> i386 and amd64, and older releases on amd64 only currently.
>>>
>>> Support may be added for earlier i386 releases once all ports properl=
y
>>> respect LDFLAGS.
>>>
>>> To enable, just add WITH_SSP=3Dyes to your make.conf and rebuild all
>>> ports.
>>>
>>> The default SSP_CLFAGS is -fstack-protector, but -fstack-protector-al=
l
>>> may optionally be set instead.
>>>
>>> Please help test this on your system. We would like to eventually ena=
ble
>>> this by default, but need to identify any major ports that have run-t=
ime
>>> issues due to it.
>>>
>>> [1] https://en.wikipedia.org/wiki/Buffer_overflow_protection
>>>
>>
>> We have not had any feedback on this yet and want to get it enabled by=

>> default for ports and packages.
>>
>> We now have a repository that you can use rather than the default to
>> help test. We need your help to identify any issues before switching t=
he
>> default.
>>
>> This repository is available for:
>>
>> head
>> 10.0
>> 9.1,9.2,9.3
>>
>> It is not available for 8.4. If someone is willing to test on 8.4 I wi=
ll
>> build a repository for it.
>>
>> Place this in /usr/local/etc/pkgs/repos/FreeBSD_ssp.conf:
>>
>> FreeBSD: { enabled: no }
>> FreeBSD_ssp: {
>>   url: "pkg+http://pkg.FreeBSD.org/${ABI}/ssp",
>>   mirror_type: "srv",
>>   signature_type: "fingerprints",
>>   fingerprints: "/usr/share/keys/pkg",
>>   enabled: yes
>> }
>>
>> Once that is done you should force reinstall packages from this
>> repository:
>>
>>   pkg update
>>   pkg upgrade -f
>>
>> Thanks for your help!
>> Bryan Drewery
>> On behalf of portmgr.
>>
>=20
>=20
> Hi,
>=20
> Is it necessary to upgrade all packages at once or can I just enable
> WITH_SSP and upgrade ports as they are updated in the ports tree?
>=20

You can let them update on their own if you wish. Of course SSP won't be
in the binaries until they are rebuilt.

--=20
Regards,
Bryan Drewery


--3cvpddJPLVi4sHvP3w9GB7dlEdgTSik23
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (MingW32)

iQEcBAEBAgAGBQJT9hZ9AAoJEDXXcbtuRpfPipAIAJbtCK1YOhC2AFy83x/GB2Ec
TieOoWYQPeatIZLsLG39cSnI/BoDa9sSvxFun987L27fvyu/rr1OY/4/ojgcj2Fq
eOYml00zFBX5eRbGGOCZ7p7W4Kt88gcuxyf0lYoCFBTqfXeOsBXB3iBYduJ4QD8f
svQBZs2SOonZ8XE9vWj1ri1a3dljRNFTb4vaeVqvSu36TF6xZCobfu38xytmt36T
HAtNyHkx5EqRFEdD+CHz/BWFptjw9AhSPGKUYwTev5+jUZjwqWh6ImznFKsDS8od
WsQubg/A5RQE2A6VxjC/vxG8P5q1Gd9b5Ub7iwKP/R6p3PQXQ4mXT7qdEIuJovQ=
=g9ae
-----END PGP SIGNATURE-----

--3cvpddJPLVi4sHvP3w9GB7dlEdgTSik23--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?53F6167D.2030303>