Gentoo Archives: gentoo-hardened

From: "Eric P." <ericp@××.net>
To: solar@g.o
Cc: gentoo-hardened@l.g.o
Subject: Re: [gentoo-hardened] Fwd: PaX, SSP, grsecurity, and whatnot
Date: Mon, 16 Feb 2004 08:05:36
Message-Id: 200402160006.34090.ericp@he.net
In Reply to: Re: [gentoo-hardened] Fwd: PaX, SSP, grsecurity, and whatnot by Ned Ludd
1 On Monday 16 February 2004 06:56 am, Ned Ludd wrote:
2 > On Sun, 2004-02-15 at 13:07, Eric P. wrote:
3 > > Hello, All:
4 > >
5 > > I'm emerge'ing a _new_ system and realized later that I *may* have made a
6 > > mistake:
7 > >
8 > > I added '-fstack-protector' to CFLAGS and began emerge'ing the
9 > > system without emerge'ing hardened-gcc first.
10 > >
11 > > According the the propolice.xml page, SSP has been included in gcc since
12 > > 3.2.3-r1 so - it is my understanding that - the '-fstack-protector'
13 > > should enhance the security of the system against buffer-overflows. But
14 > > by not using hardened-gcc, I'm concerned that I may have missed-out on a
15 > > critical security enhancement.
16 >
17 > You have.
18 > But without a kernel to support it would do little good.
19 >
20 > >Should I re-emerge the entire system or just emerge hardened-gcc before
21 > > emerge'ing grsec-sources?
22 >
23 > The kernel has been known not to play along with hgcc at times so
24 > probably your best bet is building your kernel beforehand and then
25 > merging hardened-gcc then finishing it off with an emerge -e world
26
27 Thanks, Ned. I'm still a bit confused though: Without a kernel to support
28 hardened-gcc, it doesn't do much to enhance security *but* when I compile a
29 kernel I should disable hardened-gcc?
30
31 The Handbook instructs to...
32
33 1. emerge system
34 2. emerge <kernel>
35 3. build the kernel
36
37 How should I integrate the hardened-gcc ebuild into this? Since SSP is already
38 integrated into gcc-3.2.3-r1 I added "-fstack-protector" to CFLAGS before
39 doing any of this.
40
41 Eric P.
42
43 --
44 gentoo-hardened@g.o mailing list

Replies