Date: Wed, 15 Oct 2014 09:38:03 +0200 From: =?utf-8?Q?Dag-Erling_Sm=C3=B8rgrav?= <des@des.no> To: Ryan Steinmetz <zi@FreeBSD.org> Cc: gecko@freebsd.org, ports-secteam@freebsd.org, chromium@freebsd.org Subject: Re: POODLE SSLv3 vulnerability Message-ID: <86siipg4v8.fsf@nine.des.no> In-Reply-To: <20141015020813.GA5814@exodus.zi0r.com> (Ryan Steinmetz's message of "Tue, 14 Oct 2014 22:08:13 -0400") References: <86iojmgn40.fsf@nine.des.no> <20141015020813.GA5814@exodus.zi0r.com>
next in thread | previous in thread | raw e-mail | index | archive | help
--=-=-= Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Ryan Steinmetz <zi@FreeBSD.org> writes: > It might be less surprising if we bundle the addon with the current > installation. I disagree. The change I proposed is simple and unobtrusive. Please consider this a formal request from the Security Officer. DES =2D-=20 Dag-Erling Sm=C3=B8rgrav - des@des.no --=-=-= Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJUPiRbAAoJEO1n7NZdz2rngR8P/2sXguNxmUzWwWb0+zDt0m9l AgKhhDFscuF8oOjjgDP3VqkUf7rXCU6bu/4U2+rNEVxe1g7l4KRaducJ7KvDAmJE v04nhckazq7TzQLK8cT1JhFbZdRQhVLbv49kQ+p5JUYhj5lvHduk/GhJXspIaMKs 7NeWaERmf/crnDoNA5X5J4yZwWT4YFjQ/AECE/n3Vr5z7F4gxEdkLRgiuUSBN4Sf ls1+5DmBOGxuj9tz90l6POrisMdOeZ82QEDkqshzvCh8dVVU2ZxzK9w4QVJMdHLI BkCOUXxiJs/DzaWtHMa3vt2IcbHUNU0jQeCF2f4Jn5X6SnHCEznxMkHdLUojD4q0 py60xcvTyRYEEISjeuM8MOgeBliYHbjgCeIxkwF7rRZG0kLx3e6BPwNfFlRv86u7 gOzCcd/3MFDzVmgSSA8x/GGUs5u4e2XJHByqiAFHCLjZEnaz82V+KUvFvKubd56z ixbowsspi4DQPthFoTTdXCR0jg02pfq/bl7ZZMAyYd5auGucGpOGX1pfT9qkc7oF Z0PJ0dpIBjIEomPdZV86fD5LuVTW+ToqdsWYgsIn3oPREUqeiagFKHGa6JmsH0A7 9uDI7CmCp7v12Vmo7ayMMgINrmzh4Z20YTFWio68na/Eriz9QuQ5wk1vcRtNmLgz yg7049eT+n/xxw9ueIYU =JCCA -----END PGP SIGNATURE----- --=-=-=--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?86siipg4v8.fsf>