May 2023 has been a very busy month behind-the-scenes here at HardenedBSD. I want to start off, though, by talking about infrastructure downtime as it's the most important take-away from this status report.
On 03 June 2023, in preparation for our move to Colorado, I will take down the following servers (hosted out of my home):
- GitLab ( https://git.hardenedbsd.org/ )
- The main installers mirror ( https://installers.hardenedbsd.org/pub )
- The package build servers
- The OS and update build servers
- The Tor Onion Service nodes
The last pre-move builds will start tomorrow on 01 June 2023. They should complete by 02 June 2023. The builds will be accessible via our two mirrors. The link to the list of up-to-date HardenedBSD mirrors is: https://hardenedbsd.org/content/mirrors
We're grateful for those who provide mirrors. You ensure that HardenedBSD's installers (and hopefully one day: packages) are available regardless of our own infrastructure. The project, and I'm sure the entire community, thanks you.
At the time of writing this status report, we have a tentative temporary hosting solution with limited bandwidth capabilities. We're evaluating multiple hosting possibilities, with this tentative temporary hosting solution being only a backup in case those other options don't pan out. We do not have an ETA for bringing the infrastructure back online.
Now, let's get on with the fun stuff! The HardenedBSD Foundation is now fully registered in Colorado! We're moving the headquarters from Maryland to Colorado while still maintaining a presence my Maryland. Keeping a Maryland presence allows us to continue serving local communities. For those curious, our Colorado registration can be found at: https://www.coloradosos.gov/ccsa/ViewReports.do?ceId=325482
We will soon update the US federal side, the completion of which finishes the move to Colorado. The HardenedBSD Foundation Board of Directors has been a great help in supporting the move.
And now, in the src tree:
- Shawn fixed NULL pointer derefs in the following portions of the kernel:
- mrsas(4)
- powerpc code
- NVIDIA Tegra CPU Frequency code <- integer overflow, too
- iw_cxgbe
- drm2 <- integer overflow, too
- hdspe-pcm
- linsysfs(5)
- beri's virtio support <- integer overflow, too
- firewire(4)
- qnnxe(4)
- axgbe pci code <- integer overflows, too
- mmc(4)
- On 14-CURRENT (and soon in hbsdfw), SHM hardening places restricitons on what can be done with the shared memory subsystem (see `shm_open(2)`.) This feature is launching with one technique (with more planned):
- Use of `shm_open(2)/__sys_shm_open2` system calls is prohibited when:
- The `hardening.harden_shm` sysctl tunable is enabled;
- The process has not opted out of the feature;
- The process has entered capability mode (aka, Capsicum mode)
- Use of `shm_open(2)/__sys_shm_open2` system calls is prohibited when:
- FreeBSD introduced an old vulnerability, the infamous (argc == 0) CVE, but this time in the linuxulator. Shawn ensured that HardenedBSD remains invulnerable.
- Shawn fixed the 14-CURRENT builds by fixing a FreeBSD commit for building ELF Toolchain's `strings(1)` utility. By default, we use llvm's.
And in ports:
- MrUnix disabled the JIT and re-enabled MPROTECT for www/ungoogled-chromium
In last month's status report, I mentioned that I decided to punish myself by running HardenedBSD 14-CURRENT/amd64 with Cross-DSO CFI enabled for base userland on my primary laptop, even during this move to Colorado. Shawn is happy to report that two months in, and he's still rocking (and keeping up-to-date with) Cross-DSO CFI! :-)
As a reminder, we mirror our src and ports repos on GitHub. They will remain available (and updated as best as I can). Links below.
GitHub src repo: | https://github.com/HardenedBSD/hardenedBSD |
GitHub ports repo: | https://github.com/hardenedBSD/ports |
Installation media mirrors: | https://hardenedbsd.org/content/mirrors |
Documentation | https://github.com/HardenedBSD/gitlab-wiki/blob/master/Home.md |