First page Back Continue Last page Graphics
Why use OpenBSD? Proactive security
All of these have been enabled by default for 10+ years:
Exploit mitigation
- Address space randomization (aka ASLR) no fixed jump targets or gaps
- W^X memory can be writable XOR executable
- Guard pages 'fence-like' unreadable, unwritable page after malloc()ed chunks, detect overruns
- Privilege separation daemons run bulk of their code as different non-privileged users (most in chroot without shell) - sshd was the first, the rest followed