OpenBSD provides a list of substantial protections against exploits inherent to the OS. Most of these features are not found in other operating systems, or at least are not turned on by default. The list from the OpenBSD website linked above includes:
- strlcpy() and strlcat()
- Memory protection purify
- W^X
- .rodata segment
- Guard pages
- Randomized malloc()
- Randomized mmap()
- atexit() and stdio protection
- Privilege separation
- Privilege revocation
- Chroot jailing
- New uids
- ProPolice
- ... and others
Do any of the security protections in OpenBSD mitigate the data-exposure from the Heartbleed attack?
In other words, would an Apache/nginx https server using OpenSSL have been any less vulnerable to the Heartbleed attack because it was being run on OpenBSD?