New stable release: HardenedBSD-stable 10-STABLE v46.10

HardenedBSD-10-STABLE-v46.10 - https://github.com/HardenedBSD/hardenedBSD-stable/releases/tag/HardenedB...

* libarchive update (2e9dcc4) [FreeBSD SA candidate]
* sqlite update (06b3d2e) [FreeBSD SA candidate]

Installer: http://installer.hardenedbsd.org/pub/HardenedBSD/releases/amd64/amd64/IS...

SHA512 (HardenedBSD-10-STABLE-v46.10-amd64-bootonly.iso) = 837af90b200d18ac1638e35f3f2af6fdd6736af0d8c810b55eeaee34f9a395d9245776e15eb898a8a75d82ba4f8d884d4ba83d5b6ace4d12089b60d1e595374d
SHA512 (HardenedBSD-10-STABLE-v46.10-amd64-disc1.iso) = ff5c5880a00531ed280b94c194e63bdd7eaea3477a43ee2532e0967efe9c87c5f3c237311cc86c5733d399e5ff8fbfaa0092edd3ed06eb166f13784c75987d4b
SHA512 (HardenedBSD-10-STABLE-v46.10-amd64-memstick.img) = 72e601ab0a24e3bf53940183aeccc96ae3115d9e5cec9291afdd700937a5c66478b02eb30a3d88f2ff66425f68e9b6edadbd6c9fbe1cfb327da1f9a65d43cd0e
SHA512 (HardenedBSD-10-STABLE-v46.10-amd64-mini-memstick.img) = fdaab7cf0b9c929c6b8c0f5dcbb3a6dcab0ae4616b2d087dc51a2aec7794ab1b48f7ca634141dcbc657c9fe86828a2472abd572418c5ddfd2a7bdcaeccdb97c5
SHA512 (HardenedBSD-10-STABLE-v46.10-amd64-uefi-bootonly.iso) = 2893c8ec4f2a6fc3cd038ca8da5dc064f55cb85c23ed138a8f325e1c5f48637bf44ad38708de6c81035cf65a770e36c109c9744bf601e966e56a971bfce55606
SHA512 (HardenedBSD-10-STABLE-v46.10-amd64-uefi-disc1.iso) = 355ba1abe8bcb9020543d2359a19cb6c2873aabb9e103c48c2c5005d2786da20ae0e0d228ae1624cf1195c07fae7be601863d0b3f91f4509aa2ec28375ca8ab7
SHA512 (HardenedBSD-10-STABLE-v46.10-amd64-uefi-memstick.img) = e936a1146bfaeb2d5eb4ce7280beaba91713867b72966fe06b6a6e4ce6d0a724f116c66d1880a915c5247afa99847863c5d96aecbbbeb16315febdc314987c58
SHA512 (HardenedBSD-10-STABLE-v46.10-amd64-uefi-mini-memstick.img) = 028bc08f064ff9d0651d52ca6bf80b5c4ce801f13ff634fae4a696388d0e7f7bd510f25f2d488a0cf919a76682efe2a9433ef562b20761eec030e938104be722

New stable version: HardenedBSD-stable 11-STABLE v46.2

HardenedBSD-11-STABLE-v46.2 - https://github.com/HardenedBSD/hardenedBSD-stable/releases/tag/HardenedB...

Installers: http://installer.hardenedbsd.org/pub/HardenedBSD/releases/amd64/amd64/IS...
Git repo: https://github.com/HardenedBSD/hardenedBSD-stable.git

Highlights:
libarchive update (CVE fixes, FreeBSD SA candidate)
sqlite update (CVE fixes, FreeBSD SA candidate)

LibreSSL Enabled By Default

Bernard Spil has done a wonderful job in importing and maintaining LibreSSL for HardenedBSD. LibreSSL in base has undergone thorough testing over a period of multiple months. We use LibreSSL in our infrastructure. When we publish our first official release, HardenedBSD 11.0-RELEASE, LibreSSL will be the default.

We have now enabled LibreSSL by default in the hardened/current/master branch. We have started a new package build with LibreSSL enabled for that branch. We are also building binary updates that will get pushed out within the next six to eight hours.

New stable version: HardenedBSD-stable 10-STABLE v46.8

HardenedBSD-10-STABLE-v46.8 - https://github.com/HardenedBSD/hardenedBSD-stable/releases/tag/HardenedB...

Headlines:
* bhyve updates
* kaby lake support for e1000
* zfs fixes
* uipc related kernel panic fixes (d36bc76, e19f452)
* rlimits related kernel panic fix (7894a6b)
* enabled kyua test builds by default
* libarchive fixes (97563c8, fad0147)
* hbsd-update updates

PIE, RELRO, and BIND_NOW for ports

We have now enabled PIE, RELRO, and BIND_NOW for the whole ports tree. This is a huge leap forwards for HardenedBSD. We now have all of base compiled with PIE + RELRO + BIND_NOW, and now a good portion of ports as well. A good portion of ports should work with PIE, RELRO, and BIND_NOW. In those cases where ports won't compile or run with PIE, check for NOPIE. In those cases where ports won't compile or run with RELRO + BIND_NOW, check for NORELRO. Please note that some ports ignore custom CFLAGS/CXXFLAGS/LDFLAGS and as such will not compile with PIE + RELRO + BIND_NOW enabled.

PIE and RELRO + BIND_NOW are disabled by default for ports that have either kmod or fortran USES flags. Kernel modules cannot be compiled with PIE, RELRO, and BIND_NOW. More research is needed for the fortran ports.

If PIE is disabled by default for a port, but the port maintainer wants to force PIE to be enabled by default, the port maintainer can set EXPLICIT_PIE. The same logic applies for RELRO + BIND_NOW, but with EXPLICIT_RELRO.

A follow-up commit has been made to explicitly disable PIE or RELRO + BIND_NOW for a number of ports. Out of roughly 26,000 ports, only around 400 failed to compile due to PIE or RELRO + BIND_NOW.

Given that there's over 26,100 ports in the tree, HardenedBSD will need to rely on its ever-growing community for runtime testing. Simply compiling an application does not mean that the application will run successfully. As an example, xorg will compile fine with RELRO + BIND_NOW, but due to how it integrates with modules during runtime, it will break. xorg still runs fine with PIE, however.

If you experience issues with a port or package, please file a bug report here.

Vulnerability Update: libarchive

Around three months ago, a post was published (mirror) on GitHub's Gist service. In the report, multiple vulnerabilities against portsnap, freebsd-update, bspatch, and libarchive were detailed. To this date, FreeBSD has been silent on official mailing lists. However, Allan Jude talked very briefly about it on BSDNow. FreeBSD is still vulnerable to the portsnap, freebsd-update, bspatch, and libarchive vulnerabilities.

Shortly after HardenedBSD was made aware of the vulnerabilities, Shawn Webb researched how HardenedBSD was affected. Since HardenedBSD has disabled portsnap and freebsd-update by default, HardenedBSD is not vulnerable to the portsnap and freebsd-update vulnerabilities. HardenedBSD does not have supporting infrastructure for portsnap or freebsd-update. The report detailed four vulnerabilities in libarchive, two of which were fixed with FreeBSD's import of libarchive 3.2.1. The other two were fixed by HardenedBSD commits acc5eaecbe4970cfb96d9549fe7dc8ceb4676557 and 6a6ac73ae630927b2dd996df3cd85c8c612c459c. The second commit has potential for fall-out, so additional testing is being performed.

For binary updates to base, HardenedBSD relies on a tool called hbsd-update, which is enabled by default in base. hbsd-update was affected. hbsd-update updates come in a single tarball that contains multiple file within it. Prior to the series of commits fixing hbsd-update, the outer tarball was not validated prior to extraction. Only the inner files were validated by enforcing digital signatures. The libarchive vulnerabilities could allow a malicious third-party to distribute update archives that could place arbitrary files on the filesystem. To address this issue, the hash of the current hbsd-update is published as part of the DNS TXT record. HardenedBSD's DNS entries are signed with DNSSEC, which hbsd-update now verifies. By utilizing DNSSEC, hbsd-update can ensure that not only the version information is valid, but also the hash of the update archive--effectively turning the DNS TXT record into a digital signature for the outer file. Those who publish their own binary updates using hbsd-update-build are advised to do the same.

Due to the new DNSSEC validation feature in hbsd-update, the unbound-host application has been wired into the base build. FreeBSD includes the code for unbound-host; however, it is not wired into the build. Additionally, we now install the DNSSEC root key 257 as part of the hbsd-update trust store. Since DNSSEC key material is routinely rotated, we will maintain the DNSSEC root key pinning in the trust store long-term.

Once FreeBSD has fixed the issues surrounding libarchive, we at HardenedBSD will evaluate using their fixes. We hope FreeBSD will communicate with their community soon regarding the already-public vulnerabilities.

Pages

Subscribe to HardenedBSD RSS