[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-bugs] #5356 [Obfsproxy]: Non-gcc compilers don't understand the hardened gcc flags of obfsproxy



#5356: Non-gcc compilers don't understand the hardened gcc flags of obfsproxy
-----------------------+----------------------------------------------------
 Reporter:  asn        |          Owner:  asn  
     Type:  defect     |         Status:  new  
 Priority:  normal     |      Milestone:       
Component:  Obfsproxy  |        Version:       
 Keywords:             |         Parent:  #5131
   Points:             |   Actualpoints:       
-----------------------+----------------------------------------------------
 It seems like clang does not understand `--param ssp-buffer-size=1` or
 `-fno-strict-overflow`. Maybe there are more compilers out there who don't
 understand those flags or other flags introduced in #5131.

 Sebastian suggested to specify what security properties we are interested
 in, and find out how they are turned on in each famous compiler. If a
 famous compiler does not support the flags we are interested in we should
 warn.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5356>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs