On 09/04/2014 16:17, Walter Hop wrote:
In my opinion this issue couldn't have been handled any better considering what 
it takes to do the job properly, congrats to the security team from me.

-Kimmo

Please don’t frame this as criticism of the security people, that’s not fair. 
Of course we all congratulate them :)

I think we’re just interested in discussing what could be improved to improve 
response time and also make their lives better.

Do we need moar Jenkins? Extra build boxes? More cash to keep people on 
retainer? Resources for training new people? Liaisons with other projects to 
improve prior notification channels? Etc.

FreeBSD ports had a fix after ~4 hours I think, Ubuntu patched their base about 
an hour later, FreeBSD base took around 24 hours. Not super bad, but I think 
it’s safe to expect much more scrutiny of security-critical code in the coming 
years, so it looks like a good time to try to streamline if possible at all.

The public attention for this and similar events may also provide a unique 
window of opportunity for soliciting extra resources from professional users 
(e.g. via a Foundation campaign).

24 hours for a fix that doesn't break ABI and is relatively simple (and proven to be fine by other distros) is horrendous for such a critical problem. I mentioned this on twitter also, but there wasn't even a headsup from the SO until the patch went live.
_______________________________________________
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Reply via email to