On Apr 10, 2014, at 12:34 PM, Nathan Dorfman <n...@rtfm.net> wrote:

> On Thu, Apr 10, 2014 at 10:56 AM, Paul Hoffman <paul.hoff...@vpnc.org> wrote:
>> If your reliance on OpenSSL bugs being fixed requires a fix at a rate faster 
>> than what the FreeBSD community provides, then you should not rely on the 
>> FreeBSD community. Install OpenSSL on your mission-critical systems from 
>> OpenSSL source, not from FreeBSD ports or packages.
> 
> I really don't think one needs to go this far. The workaround provided
> in the original OpenSSL advisory, recompiling with
> -DOPENSSL_NO_HEARTBEATS, was directly applicable to FreeBSD. For
> anyone unsure exactly where to effect that option, it was discussed on
> this very list. Also posted on this list was a working patch
> containing the actual fix, on Monday afternoon.

That fixed *this* bug; earlier ones took actual patches.

> So yes, if you want a fully tested, reviewed and supported fix, you
> had to wait, but anyone in desperate need of an immediate fix had
> options that didn't involve ditching FreeBSD's OpenSSL.

I was not proposing ditching FreeBSD's OpenSSL when the next bug was found: I 
was proposing that you switch at your own speed before the next emergency. And 
I'm not proposing that's the best thing to do: I'm certainly not going to, I'm 
quite happy with the FreeBSD response.

This is a different proposal than "someone should get paid to reduce my 
security timing issues". It is "I should take responsibility for my security 
timing issues".

--Paul Hoffman
_______________________________________________
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Reply via email to