top | item 9217022

Theo de Raadt on OpenSSL vulnerabilities coming on the 19th

202 points| bootload | 11 years ago |marc.info | reply

66 comments

order
[+] noir_lord|11 years ago|reply
> The OpenSSL group do not tell the LibreSSL group about vulnerabilities that they are fixing in upcoming releases.

> Why? Well, they just don't. That's the whole story.

Then the story sucks, security of core components underlying the internet is bigger than any one group.

Respect for end users would indicate that a simple heads up of a high severity bug to someone on the LibreSSL team would be the way to go.

[+] detaro|11 years ago|reply
Well, according to (also unsourced, so no clue what the "real" story is) comments on the sister submisson [1] it is because LibreSSL doesn't want to take part in the embargo on reported vulnerabilities.

[1] https://news.ycombinator.com/item?id=9216815

[+] rlpb|11 years ago|reply
> > Why? Well, they just don't. That's the whole story.

It's not the whole story. Here's the whole story:

http://lwn.net/Articles/601958/

"As it turns out, de Raadt had been asked if he wanted to join the distros list back in early May."

"[de Raadt:] So I'll decline."

[+] bdg|11 years ago|reply
Theo has a reputation for this attitude. He's not entirely unlike Linus in that he's brilliant and people don't want to deal with him.
[+] some_furry|11 years ago|reply
[+] cjg_|11 years ago|reply
It is weird, two of them (CVE-2015-0288 and CVE-2015-0209) are listed here also with links to patches, https://security-tracker.debian.org/tracker/source-package/o... Why have embargo on the vulnerabilities if you publish patches anyway? Which makes me think that the patches has not been committed yet and that the embargoed are different ones than these.
[+] kriro|11 years ago|reply
I can't say I feel comfortable with an announcement of "there's a vulnarability ranked high but we won't patch it until the 19th". I get why they do it that way and I prefer this announcement to nothing but it's still somewhat unsettling.

They obviously know a lot more about security than I do so I'll live with that decision.

[+] TomMasz|11 years ago|reply
It's less than ideal but the obvious remediation is to update OpenSSL. Of course, if there are any other remediations it would be nice to know about them sooner. I know I'll have customers bugging me before Thursday.
[+] tomjen3|11 years ago|reply
Oh great, egos is programming leading to worse security situations for everybody.

Yeah Theo they made a fork of your code because it was insecure - that doesn't mean you should hope for them to fail just so you can say "they had a bug too".

[+] shiggerino|11 years ago|reply
Who exactly made a fork of Theo's code?

Also, I don't see how you can read any ill intent out of the email alone. It shouldn't be unreasonable for the OpenSSL devs to share vulnerabilities with LibreSSL. I don't think he would use it for any malicious purposes. Though I guess it makes you want to err on the side of caution when he comes up with such classics as declaring Apache 2.0 proprietary for no other reason that it has more lines of text than the previous version.

[+] rikkus|11 years ago|reply
Not sure what he's saying. That the OpenSSL group are going to send the LibreSSL group vulnerabilities? That the LibreSSL group are about to disclose OpenSSL vulnerabilities? Just a bit confused!

Okay, a later story just appeared, I quote:

  "This or earlier LibreSSL releases may also address issues that are to be revealed
  by The OpenSSL Project Team on the 19th of March, 2015."
This story is probably redundant now, then.