Sidebar Sponsor |
 |
Random Distribution | 
Gentoo Linux
Gentoo Linux is a versatile and fast, completely free Linux distribution geared towards developers and network professionals. Unlike other distros, Gentoo Linux has an advanced package management system called Portage. Portage is a true ports system in the tradition of BSD ports, but is Python-based and sports a number of advanced features including dependencies, fine-grained package management, "fake" (OpenBSD-style) installs, safe unmerging, system profiles, virtual packages, config file management, and more.
Status: Active
| |
Latest News and Updates |
|
2018-12-18 |
NEW • BSD Release: HardenedBSD 12-1200058 |
Rate this project
|
HardenedBSD is a security-enhanced fork of FreeBSD. the project has released a new stable branch, 12-STABLE, and 12-1200058 is the first version of the new series. The new branch includes the ability to run bhyve inside a jail and introduces Non-Cross-DSO Control-Flow Integrity (CFI). "Non-Cross-DSO CFI is an exploit mitigation technique that helps prevent attackers from modifying the behavior of a program and jumping to undefined or arbitrary memory locations. Microsoft has implemented a variant of CFI, which they term Control Flow Guard, or CFG. The PaX team has spent the last few years perfecting their Reuse Attack Protector, RAP. CFI, CFG, and RAP all attempt to accomplish the same goal, with RAP being the most complete and effective implementation. Clang's CFI is stronger than Microsoft's CFG and PaX Team's RAP is stronger than both CFI and CFG. RAP would be a great addition to HardenedBSD; however, it requires a GPLv3 toolchain and is patented." Further details can be found in the project's release announcement. Download: FreeBSD-12.0-STABLE-amd64-disc1.iso (899MB, SHA512, signature, pkglist). |
|
About HardenedBSD
|
Founded in 2014 by Oliver Pinter and Shawn Webb, HardenedBSD is a security-enhanced fork of FreeBSD. The HardenedBSD Project is implementing many exploit mitigation and security technologies on top of FreeBSD. The project started with Address Space Layout Randomization (ASLR) as an initial focal point and is now implementing further exploit mitigation techniques.
|
|
|