[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-bugs] #5356 [Obfsproxy]: Non-gcc compilers don't understand the hardened gcc flags of obfsproxy
#5356: Non-gcc compilers don't understand the hardened gcc flags of obfsproxy
-----------------------+----------------------------------------------------
Reporter: asn | Owner: asn
Type: defect | Status: new
Priority: normal | Milestone:
Component: Obfsproxy | Version:
Keywords: | Parent: #5131
Points: | Actualpoints:
-----------------------+----------------------------------------------------
It seems like clang does not understand `--param ssp-buffer-size=1` or
`-fno-strict-overflow`. Maybe there are more compilers out there who don't
understand those flags or other flags introduced in #5131.
Sebastian suggested to specify what security properties we are interested
in, and find out how they are turned on in each famous compiler. If a
famous compiler does not support the flags we are interested in we should
warn.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/5356>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs