Skip to content

GitLab

  • Menu
Projects Groups Snippets
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
  • Trac Trac
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Issues 246
    • Issues 246
    • List
    • Boards
    • Service Desk
    • Milestones
  • Monitor
    • Monitor
    • Metrics
    • Incidents
  • Analytics
    • Analytics
    • Value stream
  • Wiki
    • Wiki
  • Activity
  • Create a new issue
  • Issue Boards
Collapse sidebar
  • Legacy
  • TracTrac
  • Issues
  • #2358

Closed (moved)
(moved)
Open
Created Jan 06, 2011 by John Brooks@special

Windows ASLR is not enabled for tor.exe, and DEP should be forced

To mitigate the potential impact of vulnerabilities, the Tor executable for Windows should be built with support for Address Space Layout Randomization. See http://www.ziki.com/fr/gcouprie+37899/post/enable-dep-and-aslr-with-mingw+10897502 for a potentially dated explanation of how this could be done for MinGW.

Additionally, Tor should permanently enable DEP by calling SetProcessDEPPolicy at startup. By default, non-server versions of Windows only apply DEP to processes that opt-in with this call, and it prevents the possibility of malicious code causing the process to opt out.

To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
Time tracking