Opened 8 years ago

Closed 6 years ago

#5356 closed defect (invalid)

Non-gcc compilers don't understand the hardened gcc flags of obfsproxy

Reported by: asn Owned by: asn
Priority: Medium Milestone:
Component: Archived/Obfsproxy Version:
Severity: Keywords:
Cc: Actual Points:
Parent ID: Points:
Reviewer: Sponsor:

Description

It seems like clang does not understand --param ssp-buffer-size=1 or -fno-strict-overflow. Maybe there are more compilers out there who don't understand those flags or other flags introduced in #5131.

Sebastian suggested to specify what security properties we are interested in, and find out how they are turned on in each famous compiler. If a famous compiler does not support the flags we are interested in we should warn.

Child Tickets

Change History (1)

comment:1 Changed 6 years ago by asn

Parent ID: #5131
Resolution: invalid
Status: newclosed

old ticket is old

we now have python obfsproxy

Note: See TracTickets for help on using tickets.