HomeBusinessHardwareSoftwareTelecomsPersonal TechnologyComment

 











Click here for another great offer!







ZDNet UK > News > Story



Click here for another great offer!

Previous Story: Apple may buy Universal Music Next Story: IBM services arm readies for on-demand computing
Software tweak may make operating systems safer
09:43 Monday 14th April 2003
Robert Lemos, CNET News.com 

The OpenBSD project is making changes in its latest operating system release that it believes could eliminate a class of security bugs that has plagued computers for decades

The OpenBSD project hopes new changes to its latest release will eliminate "buffer overflows", a software issue that has been plaguing security experts for more than three decades.

Theo de Raadt, the project leader for the group, believes that the group's latest improvements to the Unix variant, due to be released on 1 May, will make causing a buffer overflow extremely difficult, if not impossible. A buffer overflow is a memory error in software that allows an attacker to run a malicious program.

"I could say that I am killing buffer overflows, but I am in the security community, so I have to put it in quotes," he told attendees at the CanSecWest security show on Thursday.

The memory bugs have resisted extermination for almost 30 years, and de Raadt said that any claims that an open-source group has done so would need to be tested.

Some attendees are already incredulous that the changes will eliminate buffer overflows. "It's just adding another layer" to the security, said Nicolas Fischbach, senior manager for security at Colt Telecom, a European communications provider. "It won't make a huge difference because there are always bugs that are found in software."

An overflow exploit generally works when an attacker sends a program requesting too much information. The data usually includes two components: one that crashes the application and one that's either a program or a memory address that points to a program that the attacker would like to run. When the application crashes due to the first component, the operating system will execute the second.

The OpenBSD team hardened the operating system to this type of attack using three tactics.

The group randomised where in memory the "stack" -- a structure that holds applications and their data -- resides, so that code designed to exploit buffer overflows will have to be tailored to the system's memory layout.

"Buffer overflows take advantage of a certain memory layout," de Raadt said. "It's a tiny waste of memory, with very little overhead, but it makes things a little bit more difficult. We are trying to make the (code) crackers work a little bit more."

In addition, the group restructured how critical addresses are stored on the stack, so that it's harder to get buffer overflows to result in a running program. The team placed a small tag, called a canary, in the memory structure to detect if addresses had been modified, a common method hackers use to get a legitimate program to run malicious code.

Finally, the group found a way to hack the BSD file system and divide main memory into a writable portion and an executable portion. Pieces of programs and data, known as pages, that are stored to memory will be placed into one of the two areas.

"We want to make sure that no page is both executable or writable simultaneously," he said. "The goal is that no hackers should be able to write code and then execute it."

The problem for the OpenBSD group is that while 64-bit processors have such memory protections available, the most-popular 32-bit processors don't. So the group has had to work around the issue and break up a computer's memory into writable and executable areas.

"You can draw a line in the sand -- before that line you can execute, above you can't," de Raadt said.

While the other security features will be available in the 1 May release, the protected memory page structure for 32-bit processors -- such as Intel x86 chips and the PowerPC chips -- won't be ready for another six months, he said.

The research was funded by a $2.3m (about £1.5m) grant from the Defense Advanced Research Projects Agency (DARPA) to the OpenBSD Project, but the latest changes go beyond the original grant request, de Raadt said.

"This really wasn't part of the DARPA grant," he said. "But it happened because the DARPA grant happened, because when you throw a bunch of... guys into a room and get them drunk, this is what you get." De Raadt was careful to point out that the group paid for its own beer.


For all security-related news, including updates on the latest viruses, hacking exploits and patches, check out ZDNet UK's Security News Section.

Let the editors know what you think in the Mailroom.


Related Links
Few takers for security outsourcing
Physical and tech security should merge
New group aims at universal security
Previous Story: Apple may buy Universal Music Next Story: IBM services arm readies for on-demand computing
Search Email Printer friendly
Sponsored by Epson

Latest News



Job of the day




Comment and Analysis

Peter Judge
Why it's cool to make codes
Rupert Goodwins
Rupert Goodwins' Diary
Rupert Goodwins
Laws and sausages


ZDNet UK Video

Latest videos
Exclusive interviews, the coolest gadgets and our pick of the keynotes - catch them now



Talk to us

mailroomuk@zdnet.com
Send us your comments
News forum
Join the discussions




















 CNET Networks: CNET | GameSpot | mySimon | TechRepublic | ZDNet
Copyright © 2003 CNET Networks, Inc. All Rights Reserved.
ZDNET is a registered service mark of CNET Networks, Inc. ZDNET Logo is a service mark of CNET NETWORKS, Inc.