This campaign is closed

HardenedBSD Development Server

Development and automated build server for the HardenedBSD project

You may also be interested in

Closed
Closed
Closed
Closed
Closed

HardenedBSD Development Server

HardenedBSD Development Server

HardenedBSD Development Server

HardenedBSD Development Server

HardenedBSD Development Server

Development and automated build server for the HardenedBSD project

Development and automated build server for the HardenedBSD project

Development and automated build server for the HardenedBSD project

Development and automated build server for the HardenedBSD project

Shawn Webb
Shawn Webb
Shawn Webb
Shawn Webb
1 Campaign |
Columbia, United States
$1,910 USD 26 backers
127% of $1,500 Flexible Goal Flexible Goal

Short Summary

The HardenedBSD project aims to continuously add advanced exploit mitigation technologies and security hardening features to FreeBSD. We have implemented Address Space Layout Randomization (ASLR), mprotect(exec) hardening, PTrace restrictions, among other features. Will will work to upstream to FreeBSD most features we implement in HardenedBSD.

The HardenedBSD project officially launched in August 2014. In just these past few months, development has really taken off. We are in need of a new server to automate the build process and unify development.

What We've Accomplished

We've already implemented these features in HardenedBSD:
  1. Address Space Layout Randomization (ASLR)
  2. Basic mprotect hardening
  3. PTrace restrictions
  4. OpenBSD's getentropy system call
  5. Migration of arc4random to chacha20
  6. SegvGuard
  7. Framework in the base system to create Position-Independent Executables (PIEs)
  8. Shared object loading order randomization in rtld
  9. Custom package repository
  10. Removal of obsolete image activators (such as a.out, svr4, coff)
  11. Self-validating build automation with Jenkins, ZFS, and bhyve

What We're Currently Working On

We're actively working on quite a few projects:
  1. Upstreaming ASLR to FreeBSD
  2. Advanced mprotect hardening
  3. Improvements to ASLR: VDSO randomization and efficient shared stack randomization
  4. Kernel W^X, KERNEXEC, and UDEREF
  5. Self-validating build automation with Jenkins, ZFS, and bhyve
  6. The full grsecurity patchset
  7. secfw, an intelligent replacement for ugidfw
  8. Ports framework support for PIE

What We Need & What You Get

  • We need $1500 to buy a new development server.
  • Donors who do not wish to remain anonymous will be listed on the HardenedBSD website.
  • If our goal of $1500 is not met, we will either budget for a less-pricey server or use the funds to help with ongoing development and hosting costs.

The Impact

HardenedBSD's impact will be far reaching. Many technology and networking companies use FreeBSD. FreeBSD powers at least 33% of peak North American traffic. You will be helping to better secure the Internet and the technologies we've grown to love.

    Risks & Challenges

    If we don't get the funding we need, we will not be able to automate our build process and development time will slow down.

      Other Ways You Can Help

      Please spread the word. Even if you're unable to donate, others may be able to.

      Looking for more information? Check the project FAQ
      Need more information
      Let us know if you think this campaign contains prohibited content.

      You may also be interested in

      Up Caret