Date: Fri, 11 Dec 2020 11:57:13 -0800 From: John-Mark Gurney <jmg@funkthat.com> To: Robert Schulze <rs@bytecamp.net> Cc: freebsd-security@freebsd.org Subject: Re: FreeBSD Security Advisory FreeBSD-SA-20:33.openssl Message-ID: <20201211195713.GO31099@funkthat.com> In-Reply-To: <72f2110e-8f1b-76ca-4dd8-2d7283b951d6@bytecamp.net> References: <20201209230300.03251CA1@freefall.freebsd.org> <20201211064628.GM31099@funkthat.com> <72f2110e-8f1b-76ca-4dd8-2d7283b951d6@bytecamp.net>
index | next in thread | previous in thread | raw e-mail
Robert Schulze wrote this message on Fri, Dec 11, 2020 at 10:14 +0100:
> Hi,
>
> Am 11.12.20 um 07:46 schrieb John-Mark Gurney:
> >
> > Assuming 13 releases w/ OpenSSL, we'll be even in a worse situation
> > than we are now. OpenSSL 3.0.0 has no support commitment announced
> > yet, and sticking with 1.1.1 for 13 will put us even in a worse
> > situation than we are today.
> >
> > What are peoples thoughts on how to address the support mismatch between
> > FreeBSD and OpenSSL? And how to address it?
> >
> > IMO, FreeBSD does need to do something, and staying w/ OpenSSL does
> > not look like a viable option.
>
> you may install a current OpenSSL via ports if you like to.
> I don't see any OpenSSL fork to be more reliable than its predecessor
> but there has been done much work in the portstree to enable the system
> administrator to switch.
That does not fix all the applications that are in base, like fetch,
that use OpenSSL.
--
John-Mark Gurney Voice: +1 415 225 5579
"All that I will do, has been done, All that I have, has not."
help
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20201211195713.GO31099>
