36C3 - A systematic evaluation of OpenBSD's mitigations

  Рет қаралды 15,014

media.ccc.de

media.ccc.de

Күн бұрын

media.ccc.de/v/36c3-10519-a_s...
OpenBSD markets itself as a secure operating system, but doesn't provide much evidences to back this claim. The goal of this talk is to evaluate how effective OpenBSD's security mitigation are, in a systematic, rational and comprehensive way.
OpenBSD's website advertises a secure and modern operating system, with cool and modern mitigations. But no rational analysis is provided: are those mitigations effective? what are their impacts on performances, inspectability and complexity? against what are they supposed to defend? how easy are they to bypass? where they invented by OpenBSD or by others? is OpenBSD's reputation warranted?
This talk aims at answering all those questions, for all OpenBSD's mitigations, because, in the words of Ryan Mallon:
Threat modelling rule of thumb: if you don’t explain exactly what you are securing against and how you secure against it, the answers can be assumed to be: “bears” and “not very well”.
For example, OpenBSD added last year a MAP_STACK flag to its mmap function, and branded it as a security measure against "ROPchains". But this mitigation used to be part of Windows until 2012, and was removed because of at least generic public bypasses. It's also implemented on Linux since 2008, but for other reasons :)
All the research done for this talk is available on isopenbsdsecu.re
stein
fahrplan.events.ccc.de/congre...

Пікірлер
FreeBSD and the absurdities of security compliance
47:19
EuroBSDcon
Рет қаралды 16 М.
EVOLUTION OF ICE CREAM 😱 #shorts
00:11
Savage Vlogs
Рет қаралды 11 МЛН
Clown takes blame for missing candy 🍬🤣 #shorts
00:49
Yoeslan
Рет қаралды 48 МЛН
Jumping off balcony pulls her tooth! 🫣🦷
01:00
Justin Flom
Рет қаралды 28 МЛН
НРАВИТСЯ ЭТОТ ФОРМАТ??
00:37
МЯТНАЯ ФАНТА
Рет қаралды 8 МЛН
The OpenBSD Hypervisor in the wild, a short story.
43:59
EuroBSDcon
Рет қаралды 12 М.
dotSecurity 2016 - Theo de Raadt - Privilege Separation and Pledge
14:52
MeetBSD 2018: Michael W Lucas - Why BSD?
43:24
iX
Рет қаралды 30 М.
36C3 -  SIM card technology from A-Z
1:03:23
media.ccc.de
Рет қаралды 19 М.
36C3 -  TrustZone-M(eh): Breaking ARMv8-M's security
57:22
media.ccc.de
Рет қаралды 12 М.
Why We Run FreeBSD current at Netflix - Drew Gallatin
40:20
OpenFest Bulgaria
Рет қаралды 11 М.
OpenBSD Attack Mitigations - Alexander Bluhm - EuroBSDcon 2023
51:54
Why Linus Torvalds doesn't use Ubuntu or Debian
2:43
TFiR
Рет қаралды 4,3 МЛН
EVOLUTION OF ICE CREAM 😱 #shorts
00:11
Savage Vlogs
Рет қаралды 11 МЛН