Bug 220245 - [NEW PORT] security/hardening-check: Check binaries for security hardening features
Summary: [NEW PORT] security/hardening-check: Check binaries for security hardening fe...
Status: Closed FIXED
Alias: None
Product: Ports & Packages
Classification: Unclassified
Component: Individual Port(s) (show other bugs)
Version: Latest
Hardware: Any Any
: --- Affects Only Me
Assignee: Kurt Jaeger
URL: https://wiki.debian.org/Hardening
Keywords: feature
Depends on:
Blocks:
 
Reported: 2017-06-24 08:17 UTC by Jov
Modified: 2017-07-05 18:02 UTC (History)
1 user (show)

See Also:


Attachments
hardening-check.shar (2.27 KB, text/plain)
2017-06-24 08:17 UTC, Jov
no flags Details

Note You need to log in before you can comment on or make changes to this bug.
Description Jov 2017-06-24 08:17:20 UTC
Created attachment 183757 [details]
hardening-check.shar

Hardening-check is a perl script to verify that the resulting binary does, in
fact, have hardening features enabled, you can use it to test each ELF binary
and the output will show if the binary has position independent executable,
stack protected, fortify source functions(not supported on FreeBSD now), read
only relocations or immediate binding supported.

WWW: https://wiki.debian.org/Hardening

QA:
portlint -AC
WARN: Makefile: [16]: possible direct use of command "perl" found. use ${PERL} instead.
WARN: Makefile: using hyphen in PORTNAME. consider using PKGNAMEPREFIX and/or PKGNAMESUFFIX.
0 fatal errors and 2 warnings found.

poudriere testport pass on 11.0R-amd64
Comment 1 commit-hook freebsd_committer freebsd_triage 2017-07-05 18:02:22 UTC
A commit references this bug:

Author: pi
Date: Wed Jul  5 18:02:03 UTC 2017
New revision: 445088
URL: https://svnweb.freebsd.org/changeset/ports/445088

Log:
  New port: security/hardening-check

  Check binaries for security hardening features

  Hardening-check is a perl script to verify that the resulting binary
  does, in fact, have hardening features enabled, you can use it to
  test each ELF binary and the output will show if the binary has
  position independent executable, stack protected, fortify source
  functions(not supported on FreeBSD now), read only relocations or
  immediate binding supported.

  WWW: https://wiki.debian.org/Hardening

  PR:		220245
  Submitted by:	amutu@amutu.com

Changes:
  head/security/Makefile
  head/security/hardening-check/
  head/security/hardening-check/Makefile
  head/security/hardening-check/distinfo
  head/security/hardening-check/pkg-descr
Comment 2 Kurt Jaeger freebsd_committer freebsd_triage 2017-07-05 18:02:43 UTC
Committed, thanks!