看板FB_security
標 題Re: A different proposal
發信站NCTU CS FreeBSD Server (Thu Apr 10 21:40:29 2014)
轉信站ptt!csnews.cs.nctu!news.cednctu!FreeBSD.cs.nctu!.POSTED!freebsd.org!ow
On Apr 10, 2014, at 12:34 PM, Nathan Dorfman <
[email protected]> wrote:
> On Thu, Apr 10, 2014 at 10:56 AM, Paul Hoffman <[email protected]> wrote:
>> If your reliance on OpenSSL bugs being fixed requires a fix at a rate faster than what the FreeBSD community provides, then you should not rely on the FreeBSD community. Install OpenSSL on your mission-critical systems from OpenSSL source, not from FreeBSD ports or packages.
>
> I really don't think one needs to go this far. The workaround provided
> in the original OpenSSL advisory, recompiling with
> -DOPENSSL_NO_HEARTBEATS, was directly applicable to FreeBSD. For
> anyone unsure exactly where to effect that option, it was discussed on
> this very list. Also posted on this list was a working patch
> containing the actual fix, on Monday afternoon.
That fixed *this* bug; earlier ones took actual patches.
> So yes, if you want a fully tested, reviewed and supported fix, you
> had to wait, but anyone in desperate need of an immediate fix had
> options that didn't involve ditching FreeBSD's OpenSSL.
I was not proposing ditching FreeBSD's OpenSSL when the next bug was found: I was proposing that you switch at your own speed before the next emergency. And I'm not proposing that's the best thing to do: I'm certainly not going to, I'm quite happy with the FreeBSD response.
This is a different proposal than "someone should get paid to reduce my security timing issues". It is "I should take responsibility for my security timing issues".
--Paul Hoffman
_______________________________________________
[email protected] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "
[email protected]"