[Tails-testers] paxtest for tails 2.0 beta

Nachricht löschen

Nachricht beantworten
Autor: Jurre van Bergen
Datum:  
To: tails-testers
Betreff: [Tails-testers] paxtest for tails 2.0 beta
amnesia@amnesia:~/checksec.sh$ paxtest kiddie
PaXtest - Copyright(c) 2003,2004 by Peter Busser <peter@???>
Released under the GNU Public Licence version 2 or later

Writing output to /home/amnesia/paxtest.log
It may take a while for the tests to complete
Test results:
PaXtest - Copyright(c) 2003,2004 by Peter Busser <peter@???>
Released under the GNU Public Licence version 2 or later

Mode: Kiddie
Linux amnesia 3.16.0-4-amd64 #1 SMP Debian 3.16.7-ckt20-1+deb8u1 (2015-12-14) x86_64 GNU/Linux

Executable anonymous mapping             : Killed
Executable bss                           : Killed
Executable data                          : Killed
Executable heap                          : Killed
Executable stack                         : Killed
Executable shared library bss            : Killed
Executable shared library data           : Killed
Executable anonymous mapping (mprotect)  : Vulnerable
Executable bss (mprotect)                : Vulnerable
Executable data (mprotect)               : Vulnerable
Executable heap (mprotect)               : Vulnerable
Executable stack (mprotect)              : Vulnerable
Executable shared library bss (mprotect) : Vulnerable
Executable shared library data (mprotect): Vulnerable
Writable text segments                   : Vulnerable
Anonymous mapping randomisation test     : 9 bits (guessed)
Heap randomisation test (ET_EXEC)        : 13 bits (guessed)
Heap randomisation test (PIE)            : 16 bits (guessed)
Main executable randomisation (ET_EXEC)  : 10 bits (guessed)
Main executable randomisation (PIE)      : 10 bits (guessed)
Shared library randomisation test        : 10 bits (guessed)
Stack randomisation test (SEGMEXEC)      : 19 bits (guessed)
Stack randomisation test (PAGEEXEC)      : 19 bits (guessed)
Arg/env randomisation test (SEGMEXEC)    : 11 bits (guessed)
Arg/env randomisation test (PAGEEXEC)    : 11 bits (guessed)
Randomization under memory exhaustion @~0: No randomisation
Randomization under memory exhaustion @0 : No randomisation
Return to function (strcpy)              : Vulnerable
Return to function (memcpy)              : Return to function (strcpy, PIE)         : Vulnerable
Return to function (memcpy, PIE)         : 
amnesia@amnesia:~/checksec.sh$ paxtest blackhat
PaXtest - Copyright(c) 2003,2004 by Peter Busser <peter@???>
Released under the GNU Public Licence version 2 or later


Writing output to /home/amnesia/paxtest.log
It may take a while for the tests to complete
Test results:
PaXtest - Copyright(c) 2003,2004 by Peter Busser <peter@???>
Released under the GNU Public Licence version 2 or later

Mode: Blackhat
Linux amnesia 3.16.0-4-amd64 #1 SMP Debian 3.16.7-ckt20-1+deb8u1 (2015-12-14) x86_64 GNU/Linux

Executable anonymous mapping             : Killed
Executable bss                           : Killed
Executable data                          : Killed
Executable heap                          : Killed
Executable stack                         : Killed
Executable shared library bss            : Killed
Executable shared library data           : Killed
Executable anonymous mapping (mprotect)  : Vulnerable
Executable bss (mprotect)                : Vulnerable
Executable data (mprotect)               : Vulnerable
Executable heap (mprotect)               : Vulnerable
Executable stack (mprotect)              : Vulnerable
Executable shared library bss (mprotect) : Vulnerable
Executable shared library data (mprotect): Vulnerable
Writable text segments                   : Vulnerable
Anonymous mapping randomisation test     : 9 bits (guessed)
Heap randomisation test (ET_EXEC)        : 13 bits (guessed)
Heap randomisation test (PIE)            : 16 bits (guessed)
Main executable randomisation (ET_EXEC)  : 10 bits (guessed)
Main executable randomisation (PIE)      : 10 bits (guessed)
Shared library randomisation test        : 10 bits (guessed)
Stack randomisation test (SEGMEXEC)      : 19 bits (guessed)
Stack randomisation test (PAGEEXEC)      : 19 bits (guessed)
Arg/env randomisation test (SEGMEXEC)    : 11 bits (guessed)
Arg/env randomisation test (PAGEEXEC)    : 11 bits (guessed)
Randomization under memory exhaustion @~0: No randomisation
Randomization under memory exhaustion @0 : No randomisation
Return to function (strcpy)              : Vulnerable
Return to function (memcpy)              : Killed
Return to function (strcpy, PIE)         : Vulnerable
Return to function (memcpy, PIE)         : Killed


all looks similar except for

Randomization under memory exhaustion @~0: No randomisation
Randomization under memory exhaustion @0 : No randomisation

I don't know why this is a problem, i'll have to look into that. Shall I open a ticket?