On 05/18/15 20:04, Mark Felder:
Fetch also doesn't have a certificate trust store out of the box.

fetch (nor SSL protocol itself) claim there is one here

FYI, you can set SSL_NO_SSL3 and SSL_NO_TLS1 in your env to stop this
behavior in fetch. If you add this to your base system image you can
lock this down pretty reliably.

I'm not using fetch for transfer of secure data at all. But yes, the countermeasures you described can be part of SA I'm calling for.

Keep in mind that changing this default behavior in fetch would be a
POLA violation and possibly break scripts for countless users.
Comparatively, is the forums HTTPS also a POLA violation? Maybe! I can't
decide. :-(

If I will be called to decide between POLA to be violated and security to be violated, I will vote for POLA violation all the times. Security have higher priority to be maintained. I'm sure it's not necessary to compare possible damages for those two scenarios.

And no broken user script may happen in advance. No system will change behavior unless upgraded to patched version by responsible admin. He should be allowed to configure patched system to start fetch in former "security violation" mode (but not by default) if it will fit better their wishes.

I consider it better than silence about the issue.

But to say true, it's not my war - and no one seems to be with me here ;-)

I have own source repository with custom system patches so I'm not tied to "official" decisions. No offense to FreeBSD team in any way! I'm just not average user. ;-)


Dan


_______________________________________________
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Reply via email to