On Tue, 2020-12-29 at 14:57 +0100, m1027 wrote:
> > > On 29 Dec 2020, at 09:13, Marcel Schilling
> > > <marcel.schill...@mdc-berlin.de> wrote:
> > > 
> > > I just want to comment that I switched to LibreSSL on several
> > > Gentoo systems years ago and never had any major issues.  I run
> > > both desktop and server systems with LibreSSL, based on X and
> > > Wayland. The only issues I ran into is a slight lag of the
> > > overlay behind the main tree so once in a while I had to mask a
> > > new version of some package for a week or so.
> 
> Let me just come back on the different views here:
> 
> @marcel: Exactly the same here. Smoothly running libressl on dozens
> of systems here, from embedded to ryzen servers, even on Gnome
> desktops. At least from the libressl *user's* perspective.
> 
> sam:
> 
> > TL;DR: [...libressl patches are...] just crippling functionality.
> 
> @sam: From the perspective of libressl maintainers I have had a hard
> time reading this thread ;-) to learn that even security is supposed
> to be an issue with libressl today!? Aren't these crippling patches
> sometimes even helpful (see some apache patches) to crop unreliable
> extra features? I might be wrong here. Actually I'd prefer something
> 'boring' and stable on ssl over new features...
> 
> Well, I cannot judge on the security issues in depth. From a short
> internet scan I don't see recent libressl issues but e.g. this one
> on openssl, https://www.openssl.org/news/vulnerabilities.html, only
> three weeks ago.
> 
> Anyway, my personal conclusion on security:
> 
> I've once switched to libressl because of the heartbleed issue.  If
> security is better with openssl these days, I'd of course switch
> back.

I can't say anything for sure but it is pretty clear that since
Heartbleed the level of auditing OpenSSL is receiving is much greater.
I honestly doubt that with its comparatively little user base LibreSSL
gets the same level of attention.

I don't really have the time or motivation to try to look for LibreSSL
security issues.  But if there's no CVE for such a core package for two
years, it either means that it's really good, that it's practically
dead or that nobody is actually releasing CVEs for it.

>   It might be worth having some warm explanations on the
> motivation in eselect NEWS, to help people out of the initial state
> of shock.

Of course a news item will be released once we determine the proper
course of action.

> 
> > > So from a pure user perspective, thing change would mean a risky
> > > update
> > > to systems running stable for years with no gain whatsoever.
> 
> Coming back on the technical way to switch back to openssl:
> 
> Thanks to Gentoo, isn't the switch back more or less something
> predictable like
> 
> - removing libressl USE / CURL flags
> 
> - download everything before compiling (emerge -f ...)
> 
> - removing libressl, installing openssl, maybe wget then, followed
>   by the rest?
> 
> It plead for something that actually *works* as many systems will
> need that change here.
> 

We are currently waiting for test results.  We don't want to guess
without testing for sure.

-- 
Best regards,
Michał Górny



Reply via email to