Subject: Re: bin/31120 (update openssl in 3beta)
To: None <gnats-admin@netbsd.org, netbsd-bugs@netbsd.org, zafer@gmx.org>
From: Greg A. Woods <woods@weird.com>
List: netbsd-bugs
Date: 06/10/2006 21:50:02
The following reply was made to PR bin/31120; it has been noted by GNATS.
From: "Greg A. Woods" <woods@weird.com>
To: christos@zoulas.com (Christos Zoulas)
Cc: gnats-bugs@NetBSD.org, gnats-admin@netbsd.org, zafer@gmx.org
Subject: Re: bin/31120 (update openssl in 3beta)
Date: Sat, 10 Jun 2006 17:45:45 -0400
--pgp-sign-Multipart_Sat_Jun_10_17:45:42_2006-1
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: quoted-printable
At Wed, 7 Jun 2006 19:12:41 -0400,
Christos Zoulas wrote:
>=20
> On Jun 7, 11:00pm, woods@weird.com ("Greg A. Woods") wrote:
> -- Subject: Re: bin/31120 (update openssl in 3beta)
>=20
> | That seems like a very much less than ideal approach to maintenance.
> | =20
> | People will no doubt be running systems built from the NetBSD-3 branch
> | in production for years yet to come, and for something as central to
> | many security-related applications as OpenSSL is, it would seem
> | important to keep it as up to date as possible in _all_ supported
> | branches.
>=20
> Greg, what version is running on 3.0?
17:27 [682] # openssl version
OpenSSL 0.9.7d 17 Mar 2004
17:28 [683] # uname -srm
NetBSD 3.0_STABLE i386
(the "cvs update -r netbsd-3" and build date was about 2006/05/08)
> Are there any known vulnerabilities
> against it?
I'm not really sure but given what I read in various forums I must
assume so. For example on openssl.org/news they say both 0.9.8a and
0.9.7h contain a "security fix" (CAN-2005-2969). I don't know how
important that particular vulnerability is in general, but I'd suggest
the average business manager won't care -- she'll just want the
vulnerability eliminated for visibility purposes at the very least.
I would also suggest very strongly that vulnerabilities are not the only
issues of importance to such a critical software component in a
production environment.
The openssl.org web site says the even the very latest releases on both
release branches, 0.9.8b and 0.9.7j, contain "important bugfixes", and
in fact all the 0.9.7* releases since 0.9.7d are listed as "including
important bugfixes".
> The problem is that openssl is such a large package, and it
> affects other things (ssh), so we have to weigh the risk/benefit of the
> upgrade.
Indeed, I couldn't agree more, but isn't a round of integration and
testing in -current sufficient to more or less eliminate those kinds of
risks?
A pullup to the netbsd-2 and netbsd-3 branches will also get some
testing before it makes it into a release, even if only by those of us
who try to follow the release branches as regularly as possible.
Given those conditions I would suggest that there's effectively zero
risk, and 100% full benefit, to upgrading openssl on all the release
branches.
Now I could probably do such a pullup myself for my own purposes, but
given the common benefit for everyone in this case I think it's
important enough to do in all the official supported release branches.
--=20
Greg A. Woods
H:+1 416 218-0098 W:+1 416 489-5852 x122 VE3TCP RoboHack <woods@robohack.ca>
Planix, Inc. <woods@planix.com> Secrets of the Weird <woods@weird.com>
--pgp-sign-Multipart_Sat_Jun_10_17:45:42_2006-1
Content-Type: application/pgp-signature
Content-Transfer-Encoding: 7bit
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 5.0i for non-commercial use
MessageID: JhB52qlZA1yqHuiKJiZEdAuchOOg5931
iQA/AwUBRIs9iGJ7XxTCWceFEQKpSgCg6OaTX6kWasfjYt9LEb9Q02Bap0gAoO2z
gDNIRZJuY3nbWVOzP2P+rXkZ
=pDDA
-----END PGP SIGNATURE-----
--pgp-sign-Multipart_Sat_Jun_10_17:45:42_2006-1--