John,

I think you touched up serious problem that should be cosidered by security team to judge how this may influence product development cycle and make a decision. Big players (like Google https://www.imperialviolet.org/2015/10/17/boringssl.html) has already made this. To broaden the scope I will suggest to consider several candidates for this position : LibreSSL, BoringSSL (or more).

Vadim.

On 2016-02-05 19:25, John Kinsella wrote:

(whoops - accidentally replied privately, bringing back to mailing list - hope Vadim's OK with that)

Realize the SSVM and VR provide "public" services - https is open on the console proxy, vpn services are open on the virtual router.

And unfortunately yes, people usually only think about improving security after issues are found - that's why security geeks like me are around. :)

I'll see if I can drop in libressl in the next week or two and see what happens....

John

Begin forwarded message:
FROM: Vadim <va...@ant.ee>

SUBJECT: RE: [DISCUSS] MOVE FROM OPENSSL TO LIBRESSL

DATE: February 4, 2016 at 11:43:07 PM PST

TO: John Kinsella <jlkin...@gmail.com>

Thank you for explanation, John.

I am not involved into CS security assessment, but existing architecture makes me feel safe, because SSVM and VR and any other system VM is accessible (by SSH) only from hypervisor host due to link-local address limitation. I don't know other ways, but it doesn't mean they do not exist.

I do share your worries about OpenSSL library vulnerabilities, especially after "heartbleed", but replacing it everywhere seems to be very hard task. I don't think you will have discussion in this list on the subject unless next "heartbleed" happens.

Vadim.

On 2016-02-04 18:01, John Kinsella wrote:
Hey Vadim - I should have clarified, sorry...

SSL libraries are used in several areas in an ACS installation:

1) On management server, for secure communication with management UI, APIs, etc. 2) On system VMs - console proxies, secondary storage VMs, and possibly virtual routers (this is off top of my head, need to confirm).

On management servers, whoever's building the system can choose whatever they want - you are correct here. What I was originally referring to was the second bullet - these are usually pre-built VM images downloaded into a CloudStack environment. That build is generated by ACS code, which currently uses OpenSSL. That's where I'm asking should we consider using LibreSSL instead.

John

On Feb 4, 2016, at 7:47 AM, Vadim <va...@ant.ee> wrote:

John,

Can CS community decide that? From my point of view this is OS distribution owner who does. OpenSSL is system package and you probably can't skip it, unless you create your own Linux distribution.

Vadim.

On 2016-02-03 17:48, John Kinsella wrote:

Folks - another OpenSSL vulnerability was announced last week[1]. I believe our current SSVMs are running Wheezy, so they should be OK according to [2]. This makes me ponder, though: Should we consider moving to LibreSSL[3] in the future? For those not familiar, it's a fork of OpenSSL with more emphasis on cleaning up the code and improving the security of the codebase. From what I've seen so far, it should be a "drop in" replacement for OpenSSL, but I haven't tested that theory out yet. I originally brought this up on security@, but it was quickly pointed out as it's not an actual vulnerability in ACS we should discuss in public, so here we are. Looking for thoughts, maybe somebody has experience moving from OpenSSL to LibreSSL in another project?
John
1: https://www.openssl.org/news/secadv/20160128.txt
2: https://security-tracker.debian.org/tracker/CVE-2016-0701
3: http://www.libressl.org/

Reply via email to