previously on this list people contributed: > On Sun, Apr 20, 2014 at 07:07:45PM +0100, Steven Chamberlain wrote: > > Hi, > > > > But meanwhile, OpenBSD developers are extensively cleaning up OpenSSL > > 1.0.1g. > > One of the problems with anything from OpenBSD is that they only > care about OpenBSD, and if you want to use that fork you'll > actually have to go and revert some of the things they're doing. >
Not true actually but of course their primary concern is naturally OpenBSD. They takes POSIX seriously and atleast one patch has brought it closer to POSIX standards. It is also clear to me that Theo wants all to follow and benefit from best practice and bug hunting, the fact that there is so much resistance is not his fault... is strlcpy still rejected by glibc on the false premise of not solving truncation despite better performance than strncpy and when it makes finding truncation much easier! when used how they have been applying it to openssl. https://lwn.net/Articles/507319/ > Some of the things they're changing are actually good changes, > but some are also just wrong. They don't seem to be understanding > why things are the way they are and seem to be changing code they > don't understand. > Based on what? heartbleed happening due to > performance for embedded but there is little need and no need for doing so generically. Sure they are ripping much out and rewriting parts just to get it going on OpenBSD initially with the statement on undeadly that portability can be brought back later. OpenSSH development certainly looks more than co-operative to linux portability. > They also seems to like to do white space changes, which is really > helpful. > Apparently it is to them in following the style(9) they are used to. What's the problem, ignoring whitespace for diffing is easy. > > It's now using native malloc/free instead of its own allocator > > which allowed the Heartbleed bug to happen. > > This did not allow heartbleed to happen. It might have hidden > CVE-2010-5298 more, but it was always there and is unrelated to > heartbleed. > It did because it would have been picked up likely weeks after the bug was introduced due to OpenBSD and Gentoo hardened bug reports or static analysis resulting in bug reports. As Theo says possibly before it was actually released meaning all risk avoided "essentially for free". > > > I wonder if this might result in an alternate SSL/TLS library we could > > use in Debian? > > There are alternatives, but I guess you mean alternative to > openssl. Currently it actually doesn't look like a good option to > me. > If it is more secure then it meets most users needs better and so I disagree. The suggestion was for another package anyway like OpenNTP which avoided the recent security issues. Of course it is too early for this to be done now and who knows how upstream will react but considering their revenue streams that will likely have a lot to do with damage limitation. -- _______________________________________________________________________ 'Write programs that do one thing and do it well. Write programs to work together. Write programs to handle text streams, because that is a universal interface' (Doug McIlroy) In Other Words - Don't design like polkit or systemd _______________________________________________________________________ I have no idea why RTFM is used so aggressively on LINUX mailing lists because whilst 'apropos' is traditionally the most powerful command on Unix-like systems it's 'modern' replacement 'apropos' on Linux is a tool to help psychopaths learn to control their anger. (Kevin Chadwick) _______________________________________________________________________ -- To UNSUBSCRIBE, email to debian-devel-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/602746.76025...@smtp109.mail.ir2.yahoo.com