docs: include hardening in measures (#5093)

pull/5097/head
James Elliott 2023-03-20 13:30:12 +11:00 committed by GitHub
parent 0fb5ac78a7
commit ae719a8e51
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 11 additions and 1 deletions

View File

@ -44,4 +44,6 @@ We are currently directly looking for someone to sponsor:
* [Security Audit](../../policies/security.md#help-wanted)
To see a list of our sponsors pleaase see the [sponsors section](../../information/about.md#sponsors) on the about page.
To see a list of our sponsors please see the [sponsors section](../../information/about.md#sponsors) on the about page.
[Open Collective]: https://opencollective.com/authelia-sponsors

View File

@ -75,6 +75,14 @@ Lastly Authelia's implementation of Argon2id is highly tunable. You can tune the
(time), parallelism, and memory usage. To read more about this please read how to
[configure](../../configuration/first-factor/file.md) file authentication.
## Protections against return oriented programming attacks and general hardening
Authelia is built as a position independent executable which makes Return Oriented Programming (ROP) attacks
significantly more difficult to execute reliably.
In addition it is built as a static binary with full relocation read-only support making this and several other
traditional binary weaknesses significantly more difficult to exploit.
## User profile and group membership always kept up-to-date (LDAP authentication provider)
This measure is unrelated to the File authentication provider.