TIP: Click on subject to list as thread! ANSI
echo: osdebate
to: Rich Gauszka
from: Rich
date: 2006-05-31 20:53:10
subject: Re: ASLR and safe exceptions

From: "Rich" 

This is a multi-part message in MIME format.

------=_NextPart_000_0477_01C684F4.3A3B2880
Content-Type: text/plain;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

   Safe exceptions are implemented starting in Windows Server 2003 and =
Windows XP SP2.  From the tools side, support was introduced in Visual =
Studio.NET 2003.  While Mike Howard's blog entry on address =
randomization, =
http://blogs.msdn.com/michael_howard/archive/2006/05/26/608315.aspx, =
mentions this and other defense mechanisms, they are all orthogonal.

   And in case anyone really was that stupid, mike miller's bullshit is =
just that.

Rich

  "Rich Gauszka"  wrote in message =
news:447e1e4e{at}w3.nls.net...
  Does that mean they won't use the Shupak patent? < name could be a=20
  coincidence though >

  =
http://www.freshpatents.com/Safe-exceptions-dt20041230ptan20040268365.php=





  "/m"  wrote in message=20
  news:kp5s72p1duen4gjrcr64rm3tpr51lt1m3g{at}4ax.com...
  >
  > http://www.theinquirer.net/?article=3D32075
  >
  > =3D=3D=3D
  > AN OPEN SAUCE security feature is being used by Microsoft to protect =
its
  > new super soar-away operating system, Vista, from buffer overrun
  > exploits.
  >
  > The feature, called Address Space Layout Randomization (ALSR) has =
been
  > sneaked under the bonnet of Windows Vista Beta 2 as part of a larger
  > plan to make it more difficult to automate attacks against the =
operating
  > system.
  >
  > ALSR randomly arranges the positions of key data areas to prevent
  > malicious hackers from predicting target addresses.
  >
  > The Vole's senior security program manager, Michael Howard told =
readers
  > of his bog that it was switched on by default, too.
  >
  > Howard said the software was added late in the game and that =
sticking on
  > by default it gave the Vole the chance to see how it performs.
  >
  > He said it could serve as a "useful defence" against malware =
attacks. It
  > is a feature of OpenBSD, PaX and Exec Shield.
  > =3D=3D=3D
  >
  > Added late in the game, eh?  Hmmm.... Wouldn't surprise me if the =
best
  > and brightest in Redmond copied the OpenBSD code.  It's under the =
very
  > free BSD license, and Microsoft does like to copy their "innovation"
  > from others.
  >
  >
  > /m=20


------=_NextPart_000_0477_01C684F4.3A3B2880
Content-Type: text/html;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable








   Safe
exceptions are =
implemented=20
starting in Windows Server 2003 and Windows XP SP2.  From the
tools = side,=20
support was introduced in Visual Studio.NET 2003.  While Mike =
Howard's blog=20
entry on address randomization, http://blogs.msdn.com/michael_howard/archive/2006/05/26/608315.as=
px">http://blogs.msdn.com/michael_howard/archive/2006/05/26/608315.aspx=
A>, mentions=20
this and other defense mechanisms, they are all orthogonal.
 
   And in
case anyone really =
was that=20
stupid, mike miller's bullshit is just that.
 
Rich
 

  "Rich Gauszka" <gauszka{at}hotmail.com>">mailto:gauszka{at}hotmail.com">gauszka{at}hotmail.com>
wrote =
in message=20
  news:447e1e4e{at}w3.nls.net...Do=
es=20
  that mean they won't use the Shupak patent? < name could be a=20
  coincidence though >http://www.freshpatents.com/Safe-exceptions-dt20041230ptan2004026=
8365.php">http://www.freshpatents.com/Safe-exceptions-dt20041230ptan20040=
268365.php"/m"=20
  <mike{at}barkto.com>">mailto:mike{at}barkto.com">mike{at}barkto.com>
wrote =
in message=20
  news:kp5s72p1due=
n4gjrcr64rm3tpr51lt1m3g{at}4ax.com...>>=20
  http://www.theinquir" target="new">http://www.theinquir=">http://www.theinquirer.net/?article=3D32075">http://www.theinquir=
er.net/?article=3D32075>>=20
  =3D=3D=3D> AN OPEN SAUCE security feature is being used by =
Microsoft to=20
  protect its> new super soar-away operating system, Vista, from =
buffer=20
  overrun> exploits.>>
The feature, called Address =
Space=20
  Layout Randomization (ALSR) has been> sneaked under the bonnet =
of=20
  Windows Vista Beta 2 as part of a larger> plan to make it more=20
  difficult to automate attacks against the operating>=20
  system.>> ALSR randomly arranges the
positions of key =
data areas=20
  to prevent> malicious hackers from predicting target=20
  addresses.>> The Vole's senior security
program manager, =
Michael=20
  Howard told readers> of his bog that it was switched on by =
default,=20
  too.>> Howard said the software was
added late in the =
game and=20
  that sticking on> by default it gave the Vole the chance to see =
how it=20
  performs.>> He said it could serve as a
"useful defence" =
against=20
  malware attacks. It> is a feature of OpenBSD, PaX and Exec=20
  Shield.> =3D=3D=3D>>
Added late in the game, =
eh?  Hmmm....=20
  Wouldn't surprise me if the best> and brightest in Redmond =
copied the=20
  OpenBSD code.  It's under the very> free BSD
license, and=20
  Microsoft does like to copy their "innovation"> from=20
  others.>>> /m


------=_NextPart_000_0477_01C684F4.3A3B2880--

--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)
SEEN-BY: 633/267 270
@PATH: 379/45 1 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.