(whoops - accidentally replied privately, bringing back to mailing list - hope 
Vadim’s OK with that)

Realize the SSVM and VR provide “public” services - https is open on the 
console proxy, vpn services are open on the virtual router. 

And unfortunately yes, people usually only think about improving security after 
issues are found - that’s why security geeks like me are around. :)

I’ll see if I can drop in libressl in the next week or two and see what 
happens….

John

> Begin forwarded message:
> 
> From: Vadim <va...@ant.ee>
> Subject: Re: [DISCUSS] Move from OpenSSL to LibreSSL
> Date: February 4, 2016 at 11:43:07 PM PST
> To: John Kinsella <jlkin...@gmail.com>
> 
> Thank you for explanation, John.
> 
> I am not involved into CS security assessment, but existing architecture 
> makes me feel safe, because SSVM and VR and any other system VM is accessible 
> (by SSH) only from hypervisor host due to link-local address limitation. I 
> don't know other ways, but it doesn't mean they do not exist.
> 
> I do share your worries about OpenSSL library vulnerabilities, especially 
> after "heartbleed", but replacing it everywhere seems to be very hard task.  
> I don't think you will have discussion in this list on the subject unless 
> next "heartbleed" happens.  
> Vadim.
> 
>  
> On 2016-02-04 18:01, John Kinsella wrote:
> 
>> Hey Vadim - I should have clarified, sorry...
>> 
>> SSL libraries are used in several areas in an ACS installation:
>> 
>> 1) On management server, for secure communication with management UI, APIs, 
>> etc.
>> 2) On system VMs - console proxies, secondary storage VMs, and possibly 
>> virtual routers (this is off top of my head, need to confirm).
>> 
>> On management servers, whoever's building the system can choose whatever 
>> they want - you are correct here. What I was originally referring to was the 
>> second bullet - these are usually pre-built VM images downloaded into a 
>> CloudStack environment. That build is generated by ACS code, which currently 
>> uses OpenSSL. That's where I'm asking should we consider using LibreSSL 
>> instead.
>> 
>> John
>> 
>>> On Feb 4, 2016, at 7:47 AM, Vadim <va...@ant.ee <mailto:va...@ant.ee>> 
>>> wrote:
>>> 
>>> John,
>>> 
>>>    Can CS community decide that? From my point of view this is OS 
>>> distribution owner who does. OpenSSL is system package and you probably 
>>> can't skip it, unless you create your own Linux distribution.
>>> 
>>> Vadim.
>>> 
>>> On 2016-02-03 17:48, John Kinsella wrote:
>>> 
>>>> Folks - another OpenSSL vulnerability was announced last week[1]. I 
>>>> believe our current SSVMs are running Wheezy, so they should be OK 
>>>> according to [2].
>>>> This makes me ponder, though: Should we consider moving to LibreSSL[3] in 
>>>> the future? For those not familiar, it's a fork of OpenSSL with more 
>>>> emphasis on cleaning up the code and improving the security of the 
>>>> codebase.
>>>> From what I've seen so far, it should be a "drop in" replacement for 
>>>> OpenSSL, but I haven't tested that theory out yet.
>>>> I originally brought this up on security@, but it was quickly pointed out 
>>>> as it's not an actual vulnerability in ACS we should discuss in public, so 
>>>> here we are.
>>>> Looking for thoughts, maybe somebody has experience moving from OpenSSL to 
>>>> LibreSSL in another project?
>>>> John
>>>> 1: https://www.openssl.org/news/secadv/20160128.txt 
>>>> <https://www.openssl.org/news/secadv/20160128.txt>
>>>> 2: https://security-tracker.debian.org/tracker/CVE-2016-0701 
>>>> <https://security-tracker.debian.org/tracker/CVE-2016-0701>
>>>> 3: http://www.libressl.org/ <http://www.libressl.org/> 
>  

Reply via email to