Gentoo Archives: gentoo-hardened

From: Ned Ludd <solar@g.o>
To: ericp@××.net
Cc: gentoo-hardened@l.g.o
Subject: Re: [gentoo-hardened] Fwd: PaX, SSP, grsecurity, and whatnot
Date: Mon, 16 Feb 2004 09:50:49
Message-Id: 1076924697.17659.2731.camel@simple
In Reply to: Re: [gentoo-hardened] Fwd: PaX, SSP, grsecurity, and whatnot by "Eric P."
1 On Sun, 2004-02-15 at 19:06, Eric P. wrote:
2 > On Monday 16 February 2004 06:56 am, Ned Ludd wrote:
3 > > On Sun, 2004-02-15 at 13:07, Eric P. wrote:
4 > > > Hello, All:
5 > > >
6 > > > I'm emerge'ing a _new_ system and realized later that I *may* have made a
7 > > > mistake:
8 > > >
9 > > > I added '-fstack-protector' to CFLAGS and began emerge'ing the
10 > > > system without emerge'ing hardened-gcc first.
11 > > >
12 > > > According the the propolice.xml page, SSP has been included in gcc since
13 > > > 3.2.3-r1 so - it is my understanding that - the '-fstack-protector'
14 > > > should enhance the security of the system against buffer-overflows. But
15 > > > by not using hardened-gcc, I'm concerned that I may have missed-out on a
16 > > > critical security enhancement.
17 > >
18 > > You have.
19 > > But without a kernel to support it would do little good.
20 > >
21 > > >Should I re-emerge the entire system or just emerge hardened-gcc before
22 > > > emerge'ing grsec-sources?
23 > >
24 > > The kernel has been known not to play along with hgcc at times so
25 > > probably your best bet is building your kernel beforehand and then
26 > > merging hardened-gcc then finishing it off with an emerge -e world
27 >
28 > Thanks, Ned. I'm still a bit confused though: Without a kernel to support
29 > hardened-gcc, it doesn't do much to enhance security *but* when I compile a
30 > kernel I should disable hardened-gcc?
31 >
32 > The Handbook instructs to...
33 >
34 Which handbook? URL Please.
35
36 > 1. emerge system
37 > 2. emerge <kernel>
38 > 3. build the kernel
39
40 4. emerge hardened-gcc
41 5. Optionally remove -fstack-protector from CFLAGS
42 6. emerge -e world
43
44 >
45 > How should I integrate the hardened-gcc ebuild into this? Since SSP is already
46 > integrated into gcc-3.2.3-r1 I added "-fstack-protector" to CFLAGS before
47 > doing any of this.
48
49 gcc-3.3.2-r5 is stable now. We are encouraging users to update to this
50 version at this time.
51
52 >
53 > Eric P.
54 --
55 Ned Ludd <solar@g.o>
56 Gentoo Linux Developer

Attachments

File name MIME type
signature.asc application/pgp-signature

Replies

Subject Author
Re: [gentoo-hardened] Fwd: PaX, SSP, grsecurity, and whatnot Hurricane Electric <ericp@××.net>
Re: [gentoo-hardened] Fwd: PaX, SSP, grsecurity, and whatnot "Eric P." <ericp@××.net>