views:

40

answers:

1

This is most probably a stupid question, but I'd like to make sure I did not miss anything:

Am I right to assume that using Elmah and code obfuscation at the same time does not make much sense since Elmah won't be able to produce any meaningful call stacks?

Thanks,

Adrian

+3  A: 

Not exactly. Some obfuscators provide somethink like mapping table, so from obfuscated call stack, the developer can get meaningfull data. For example, dotfuscator calls it "Stack Trace Translation".

Igor
But for that to work wouldn't I would have debug the binary and use the pdb file and / or the mapping file created by the obfuscator? One of the great things about Elmah is that I can browse crashes and view call stacks directly without even starting my IDE.
Adrian Grigore
The obfuscated assembly contains obfuscated names (functions,fileds...). So any crash dump, call stack log... contains obfuscated names. You would have to use the mapping functionality provided by the obfuscator engine. This is why to obfuscate. Obfuscated assembly does not know anythink about the real (developer frendly) names.
Igor