Ingo Schwarze <schwa...@usta.de> wrote:

> Hi,
> 
> Theo de Raadt wrote on Thu, Jun 11, 2020 at 10:12:47AM -0600:
> > Romero Perez, Abel <romeropereza...@gmail.com> wrote:
> 
> >> I suggest only to have a look into better measures of security by
> >> researching optimization flags, to find an equilibrium of optimization
> >> and security.
> 
> > Romero, that is bullshit.
> 
> However, there is something i ought to do to make such bugs less
> likely: Remove the last vestigial type-unsafe pointer handling.
> That was designed a decade ago with an excessive focus on flexibility
> when the scope of the program was not yet clear.  A typical example
> of over-abstraction.  When you don't know yet how general your code
> might need to be, write specific code first.  If it turns out
> additional situations need to be handled, consider generalizing it
> (and again, don't go overboard).  Never invent abstractions "because
> just in case".
> 
> If we would need many dozens of different output formats, and people
> would want to plug in new ones at run time or something crazy like
> that, the abstraction implemented with these void pointers might
> have a point.  But now that we know that less than a dozen output
> formats are really needed, and that they are all very stable, there
> are very likely ways to improve this code, making it more robust
> and less error-prone.

No way Ingo, you should be carefully use the compiler -O option!!!!!
It is the way to security, expert Romero has spoken!

Reply via email to