On Apr 10, 2014, at 12:36 PM, ari edelkind 
<edelkind-list-freebsd-secur...@episec.com> wrote:

> On Thu, Apr 10, 2014 at 10:56 AM, Paul Hoffman wrote:
> 
>> Quite right. It is reasonable to assume that, given what we now know about
>> the memory allocation scheme in OpenSSL, that other bugs exist and will
>> only be found by exploits. Thus, it is reasonable to assume that there will
>> be future emergencies like Heartbleed related to bugs in OpenSSL.
>> 
> 
> I'm guessing you read a popular post by Theo de Raadt that's been going
> around.  Sorry, but OpenBSD's bastardized memory allocation scheme would
> not have solved this; OpenSSL's malloc implementation was not to blame
> here.  

I have heard from others, less interested in self-aggrandizement than Theo, 
that OpenSSL's malloc was significantly to blame. I'm not saying OpenBSD's is 
better, just that I have heard from multiple sources that OpenSSL 
malloc-wrapping both hides some bugs and makes them hard to find with automated 
tools.

> Amateurish failure to check the sanity of user-supplied input was to
> blame.  

Yes.

> Idiotic, error-prone protocol specifications, written by
> non-programmers, were to blame.  

Not in this case.

> OpenSSL's allocator, in this instance,
> worked fine -- even if it isn't the optimal choice for all operating
> systems.

Maybe; I'm certainly not in a position to say either way.

> If your reliance on OpenSSL bugs being fixed requires a fix at a rate
>> faster than what the FreeBSD community provides, then you should not rely
>> on the FreeBSD community.
> 
> 
> Or just make sure that all of your running services link to the OpenSSL
> library built from ports.  While i'm not exactly thrilled with the prospect
> of waiting a significant amount of time for a vulnerability in the base
> distribution to be officially patched, relying on the base system for
> something like that is a bit like taking a tank to the racetrack.

Updates to ports are inherently slower than patches from the OpenSSL team. My 
point is not that either ports or distribution are "too slow" for everyone: it 
is that if you are sure you need something faster than them, there is another 
option.

>> Install OpenSSL on your mission-critical systems from OpenSSL source, not
>> from FreeBSD ports or packages.
> 
> 
> This is a poor idea from a maintenance standpoint.  Firstly, the ports
> system was updated fairly quickly,

...but not necessarily quick enough for the people complaining about the 
response speed of the FreeBSD team...

> but aside from that, updating an
> existing port yourself to download and install the next version is usually
> a trivial task.  And you get package management for free.

Again: the whole point of this thread are people who apparently need more 
speed, demanding that someone be paid to make things faster for them.

--Paul Hoffman
_______________________________________________
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Reply via email to