Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
aslr [2018/08/18 14:28] rpjdayaslr [2018/08/18 14:35] (current) – [Basics] rpjday
Line 7: Line 7:
   * [[https://lwn.net/Articles/569635/|Kernel address space layout randomization (LWN, 2013)]]   * [[https://lwn.net/Articles/569635/|Kernel address space layout randomization (LWN, 2013)]]
   * [[https://linux-audit.com/linux-aslr-and-kernelrandomize_va_space-setting/|Linux and ASLR: kernel/randomize_va_space]]   * [[https://linux-audit.com/linux-aslr-and-kernelrandomize_va_space-setting/|Linux and ASLR: kernel/randomize_va_space]]
 +  * [[https://securityetalii.es/2013/02/03/how-effective-is-aslr-on-linux-systems/|How Effective is ASLR on Linux Systems? (2013)]]
 +
 +Questions:
 +
 +  * What about kernel ASLR (KASLR)? Look for ''RANDOMIZE'' options.
  
 ===== Basics ===== ===== Basics =====
  
-  * Binaries must be position-independent executables.+Binaries must be position-independent executables, so worthless on statically-compiled binaries. Possible settings: 
 + 
 +  * 0 – No randomization. Everything is static. 
 +  * 1 – Conservative randomization. Shared libraries, stack, mmap(), VDSO and heap are randomized. 
 +  * 2 – Full randomization. In addition to elements listed in the previous point, memory managed through brk() is also randomized. 
  
 ===== Checking and changing ===== ===== Checking and changing =====
  • aslr.1534602505.txt.gz
  • Last modified: 2018/08/18 14:28
  • by rpjday