On Wed, 30 Sep 2015 15:22:40 +0200 hasufell wrote:
> On 09/30/2015 02:10 PM, Kristian Fiskerstrand wrote:
> > On 09/30/2015 01:51 PM, Rich Freeman wrote:
> > 
> >> I think it was fair to pause to see if somebody could come up with
> >>  a better solution that allows co-existence, but absent that I 
> >> don't see any benefit from keeping libressl out of the tree.
> >> We'll just experience all the downsides of the fork without the
> >> upsides.
> > 
> > This is what worries me as well, as it increase workload and
> > complexity affecting multiple projects without any immediate and
> > obvious gain.
> > 
> 
> I'm not sure if you have followed the link I just posted:
> https://en.wikipedia.org/wiki/LibreSSL#Security_and_vulnerabilities
> 
> 0 vs 5 high severity vulnerabilities is a pretty obvious gain.

This is a poor argument, because user base of libressl is much
smaller than of openssl, so probability of undiscovered issues is
higher for libressl than for openssl. Yes, libressl is good at
fixing openssl long-standing issues (e.g. dropping outdated code),
but they may have their own critical vulnerabilities in some new
functions, not present in openssl. Anyway diversity is very good
for security: not everything will be affected by critical issues.

The only thing bothers me that we will end up with two major
packages demanding ssl implementation which can't be installed at
the same time. While for now we tend to postpone solution of such
problem, it is only matter of time when we'll face it. Perhaps
static linking for one of the libraries will do the job, despite
it sounds crasy.

Still, we can go ahead and introduce some mechanism forcing static
linking with libressl for consumer apps if user demands this.

Best regards,
Andrew Savchenko

Attachment: pgpPXQXSTkmuw.pgp
Description: PGP signature

Reply via email to