Organizational Changes Coming, Feedback Requested

We're currently planning some organizational changes as well as trying to figure out where we should focus our work. Feel free to comment on this news post with things you would like to see. We're planning to bring some contests either late this month or early next month. Last but not least, we have a poll about hosting a weekly or monthly IRC chat where members of SX will answer any question you have. Please click here and let us know if you would attend such an event.

Site Enhancements

Just a heads up that we've completed a few site enhancements and are working on a few more. We've done some optimizations to speed up new post creation - hopefully this will resolve some of the double posting issues. We've also forced all http[s]://soldierx.com traffic to redirect to https://www.soldierx.com as well as forced all cookies to be www.soldierx.com rather than .soldierx.com. This will help protect against cookie stealing attacks that would utilize servers such as hei. We're working on getting some minor theme updates completed as well as playing around with having a mobile theme for phones and such.

Jerbo Loves Cannabis, and Now You Can Too!

I wrote a guide a while back, and, well, you can read all about it here: https://www.soldierx.com/tutorials/GYOB-Grow-Your-Own-Bud

I'm going to add a couple additions, one with some tidbits on breeding and another on working with seeds and sexing since I left that part out.

HardenedBSD - SoldierX's First BSD Distribution

I've been extremely busy these past few weeks to bring SoldierX a slice of awesomeness. Early on in the ASLR project, SoldierX graciously donated a sparc64 and later a BeagleBone Black. We've been able to identify a few (still outstanding) issues on ARM with our ASLR implementation. Our implementation would not be as stable, robust, or feature-complete today if it weren't for SoldierX's sponsorship and donations. It is with tremendous excitement that today I'm announcing the launch of the HardenedBSD project.

The HardenedBSD project aims to enhance FreeBSD's security by adding many exploit mitigation technologies and upstreaming those enhancements directly to FreeBSD. You can think of HardenedBSD as more of a staging area for bleeding-edge development of exploit mitigation, hardening, and other security-related technologies for FreeBSD. Once ASLR is feature complete and fully upstreamed (including integration with the Ports tree), I'll port certain security features from the Grsecurity Linux kernel hardening patch.

Please keep in mind that we're still in the early stages of getting everything set up. I'm building our first official package repo as we speak (with more than 20,000 packages, it takes a lot of time). Please give it a spin.

Defcon 22

Amp here, I figure I should give a quick update and mention that DEF CON is this week and as mentioned before, we will be firing on all cylinders. Blake and cisc0ninja will be presenting this year and covering practical DDoS defense. In addition, I will once again represent our crew as a part of the Hackers Against Humanity tournament. For those attending, look for the SX shirts as they may lead you to one of the crew members. Wink

Whitepaper - Introducing ASLR for FreeBSD

Introducing ASLR For FreeBSD
Shawn Webb
Oliver Pinter
10 July 2014
http://www.hardenedbsd.org/

[ 1. Introduction ]
Security in FreeBSD is based primarily in policy-based technologies. Existing
tools such as jails, Capsicum, vnet/vimage, and the MAC framework, can make
FreeBSD-based systems quite resilient against attacks. FreeBSD lacks basic
low-level exploit mitigation, such as Address Space Layout Randomization
(ASLR)[1]. ASLR randomizes the address space layout of an application, making
exploitation difficult for an attacker. This paper and the associated
implementation aim to provide a secure, robust, extensible, and easily-managed
form of ASLR fit for production use within FreeBSD.

Syndicate content